name |
X0mail |
Infineon Smart Card IC (Security Controller) SLE66CL180PE / m1585-a14, SLE66CL180PEM / m1584-a14, SLE66CL180PES / m1586-a14,SLE66CL81PE / m1594-a14, SLE66CL81PEM / m1595-a14, SLE66CL80PE / m1591-a14, SLE66CL80PEM / m1592-a14, SLE66CL81PES / m1593-a14,SLE66CL41PE / m1583-a14 with specific dedicated software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
23.02.2010 |
22.08.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0538a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0538b.pdf |
manufacturer |
Thales Norway AS |
Infineon Technologies AG |
manufacturer_web |
https://www.thales.no/ |
https://www.infineon.com/ |
security_level |
EAL4 |
EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
f310fe4b0c9c7eb1 |
a2209ee873e2938e |
heuristics/cert_id |
SERTIT-014 |
BSI-DSZ-CC-0538-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, ALC_CMC.4, AVA_SOF.1, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_DVS.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1 |
ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0572-2008 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0431-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0572-2008 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0431-2007, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0572-2008 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0431-2007, BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0572-2008 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0431-2007, BSI-DSZ-CC-0322-2005 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
- maintenance_date: 27.03.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0538_ma2.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC''s (Security Controller) SLE66CL180PE / m1585-a15, SLE66CL180PEM / m1584-a15, SLE66CL180PES / m1586-a15, SLE66CL81PE / m1594-a15, SLE66CL81PEM / m1595-a15, SLE66CL80PE / m1591-a15, SLE66CL80PEM / m1592-a15,SLE66CL80PES / m1593-a15, SLE66CL41PE / m1583-a15 with specific dedicated software
- maintenance_date: 29.01.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0538_ma1.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CL180PE / m1585-a14, SLE66CL180PEM / m1584-a14, SLE66CL180PES / m1586-a14, SLE66CL81PE / m1594-a14, SLE66CL81PEM / m1595-a14, SLE66CL80PE / m1591-a14, SLE66CL80PEM / m1592-a14, SLE66CL81PES / m1593-a14, SLE66CL41PE / m1583-a14 with specific dedicated software
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20100223_SERTIT-008CR_issue201.0.pdf |
0538a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0538-2008
- cert_item: Infineon Smart Card IC (Security Controller) SLE66CL180PE / m1585-a14, SLE66CL180PEM / m1584-a14, SLE66CL180PES / m1586-a14, SLE66CL81PE / m1594-a14, SLE66CL81PEM / m1595-a14, SLE66CL80PE / m1591-a14, SLE66CL80PEM / m1592-a14, SLE66CL81PES / m1593-a14, SLE66CL41PE / m1583-a14 with specific dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0431-2007: 5
- BSI-DSZ-CC-0538: 2
- BSI-DSZ-CC-0538-2008: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 17
- EAL1: 1
- EAL4+: 3
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.2: 2
- FDP_IFF.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 11
- Infineon AG: 24
- Infineon Technologies: 6
- Infineon Technologies AG: 10
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 32: 1
- AIS 34: 3
- AIS 35: 1
- AIS 36: 1
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 3
- ISO/IEC 7816-3: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / m1583-a14, Test Laboratory: Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] SLE66CLxxxP - Anticollision Type A, Version 03.03, 2003-03, Infineon AG [12] SLE66CLxxxP -: 1
- SLE66CL41PE / m1583-a14, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration Management Scope (ACM_SCP), SLE66CL180PE / m1585-a14, SLE66CL180PEM / m1584-a14: 1
- SLE66CL80PES / m1593-a14, SLE66CL41PE / m1583-a14, Version 1.1, from 2008-07-02, Infineon AG (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20100315130843
- /ModDate: D:20100315130843
- pdf_file_size_bytes: 542517
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20080903090739+02'00'
- /Creator: Writer
- /Keywords: "Zertifizierung, Certfification, Common Criteria, Infineon Technologies AG, Infineon Smart Card IC (Security Controller) SLE66CL180PE / m1585-a14, SLE66CL180PEM / m1584-a14, SLE66CL180PES / m1586-a14, SLE66CL81PE / m1594-a14, SLE66CL81PEM / m1595-a14, SLE66CL80PE / m1591-a14, SLE66CL80PEM / m1592-a14, SLE66CL81PES / m1593-a14, SLE66CL41PE / m1583-a14 with specific dedicated software"
- /ModDate: D:20080903153142+02'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Zertifizierung
- /Title: Zertifizierungsreport BSI-DSZ-CC-0538-2008
- pdf_file_size_bytes: 627716
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
0538b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0266-2005: 1
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0399-2006: 1
- BSI-DSZ-CC-0430-2007: 1
- BSI-DSZ-CC-0431-2007: 1
- BSI-DSZ-CC-0482-2007: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 5
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 10
- ACM_AUT.1.1: 1
- ACM_CAP.3: 1
- ACM_CAP.4: 20
- ACM_SCP.2: 7
- ADO:
- ADO_DEL.1: 1
- ADO_DEL.2: 11
- ADO_IGS.1: 13
- ADV:
- ADV_DVS.1: 1
- ADV_FSP.1: 7
- ADV_FSP.2: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 17
- ADV_IMP.1: 11
- ADV_LLD.1: 18
- ADV_RCR.1: 9
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 22
- AGD_USR.1: 16
- ALC:
- ALC_DVS.1: 9
- ALC_LCD.1: 9
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 8
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 15
- AVA_SOF.1: 10
- AVA_VLA.2: 15
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 1
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 33
- FAU_GEN.1.1: 1
- FAU_GEN.2: 16
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.2: 15
- FAU_STG.1: 21
- FAU_STG.3: 15
- FAU_STG.4: 9
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 4
- FDP_IFC.2: 9
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.2: 10
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 2
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC.2: 10
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.2: 17
- FIA_UAU.2.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 24
- FIA_USB.1: 13
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 2
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_RCV.2: 11
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RCV.4: 9
- FPT_RCV.4.1: 1
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP.3: 10
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TSE.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TSE.1: 19
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 6
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADM_TRAINING: 4
- A.AUDIT_REVIEW: 3
- A.CONFIDENCE: 4
- A.INVALIDATE: 3
- A.NETWORK: 4
- A.NOTIFY: 3
- A.OS: 5
- A.PHYSICAL: 4
- A.PHYSICAL_LOC: 3
- A.USR_TRAINING: 3
- O:
- O.ACCESS_HIST: 13
- O.AUDIT: 13
- O.AUTO_LOGOUT: 10
- O.CMD_ACL: 7
- O.CMD_LOG: 16
- O.DAC: 8
- O.DIG_SIGN: 3
- O.ID_AUTH: 14
- O.LABELLING: 8
- O.LOCK: 8
- O.MAC: 9
- O.MAC_INTEGRITY: 10
- O.MANAGE: 6
- O.MESSAGING: 8
- O.RECOVER: 9
- O.REF_MONITOR: 8
- O.RESOURCE_SHARE: 7
- O.REUSE: 9
- O.ROLES: 10
- O.ROLE_MNG: 7
- O.SELF_TEST: 8
- OE:
- OE.ACCOUNTABLE: 11
- OE.AUDIT: 13
- OE.ID_AUTH: 8
- OE.NETWORK: 17
- OE.PHYSICAL: 1
- OE.TRAF_SEPARATION: 11
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 4
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
- RFC:
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- ISO:
- ISO/IEC 7816: 2
- ISO/IEC 7816-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
- out of scope: 1
|
- OutOfScope:
- out of scope: 1
- single DES is out of scope of the evaluation: 1
- smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding: 1
|
pdf_data/st_metadata |
- /Author: Thales Norway AS
- /CreationDate: D:20090430154245+02'00'
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20090430154245
- /Producer: AFPL Ghostscript 8.13
- /Subject:
- /Title: XOmail Version 14.2 Security Target ed 10-public
- pdf_file_size_bytes: 2346280
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
- /Author: Hans-Ulrich Buchmüller
- /CreationDate: D:20080820090613Z
- /Creator: SecurityTarget_SLE66CL180_81_80_41PEx_a14_1.2_03.doc - Microsoft Word
- /Keywords: Security Target, dual interface, Security Controller, public, document, resistance to attackers with high attack potential, Infineon Technologies AG, m1585, m1584,
- /ModDate: D:20080903153213+02'00'
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Subject: CC EAL5+ Certification Security Target
- /Title: Security Target SLE66CL180PEx, SLE66CL81PEx, SLE66CL80PEx, SLE66CL41PE a14
- pdf_file_size_bytes: 294887
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |