Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0879-V3-2018
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
BSI-DSZ-CC-1025-V2-2019
name Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware) Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
not_valid_before 2018-04-03 2019-12-17
not_valid_after 2023-04-03 2024-12-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2b_pdf.pdf
status archived active
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
state/cert/pdf_hash 52a2a3dce7d04b560a1f6d2be7fe2b85d022f7587357a1a6b33a68a24b302282 fa97d1d96f356a0a41d19b5d57637a731ca5bc3d0e6839ba70c4c28c2cdb9811
state/cert/txt_hash b81c7665198bd25bd15303b862333cd0435dd2172797bc86a23a7067b6b658af 0d454e3ca4af8e792d796d794a2c06d89fe30d18bbff26bb106cc25a20709907
state/report/pdf_hash 7df3ce72df5a402ee7dd1b434497162f9c0b840f8bee3d16357beae2051d1203 dc2b35098ff19fbc343e556dfc6e1eb4390740682d6e5d1609a0175e769af347
state/report/txt_hash e25d350eb8ecfa0911c984a1c2a53c066cd9278285e5b2f526c168f43acd54b7 e988b50798cad12563f7da7af98ab850b78b895544319e7e161dc43a4dc0c848
state/st/pdf_hash 80b6285501f7c4326337d4782ae6f522567c6adbc6c6ada5c32a638f4492192e fb1f35ea13769b6d773dc8ed703107c0ca12f1e25b68fe8a027b10b2357d9a8e
state/st/txt_hash d7b08c9f5c2995c80702660a9626e220cb623cac113ca09413f26df4281162f1 d0979135e372c95ebf0c6755dc44ca24b9ad32c39cfcab2f4a74853be3190308
heuristics/cert_id BSI-DSZ-CC-0879-V3-2018 BSI-DSZ-CC-1025-V2-2019
heuristics/extracted_versions 1.01, 2.02.010, 2.03.008, 1.03.006 -
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019 BSI-DSZ-CC-1025-V3-2020
heuristics/report_references/directly_referencing BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-1025-2018
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V3-2020, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1071-V7-2023 BSI-DSZ-CC-1025-V4-2021, BSI-DSZ-CC-1025-V3-2020, BSI-DSZ-CC-1025-V5-2023
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-1025-2018
heuristics/st_references/directly_referenced_by ANSSI-CC-2019/04, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, BSI-DSZ-CC-1084-2019 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1071-2019, ANSSI-CC-2024/13, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-1084-2019 None
pdf_data/cert_filename 0879V3c_pdf.pdf 1025V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V3-2018: 1
  • BSI-DSZ-CC-1025-V2-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 1
  • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/cert_keywords/vendor/Infineon
  • Infineon: 1
  • Infineon Technologies AG: 1
  • Infineon Technologies AG: 1
pdf_data/cert_metadata//CreationDate D:20180416135147+02'00' D:20191218142732+01'00'
pdf_data/cert_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6" Infineon Technologies AG, Common Criteria, Certification, IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software, security controller
pdf_data/cert_metadata//ModDate D:20180416143812+02'00' D:20191218142905+01'00'
pdf_data/cert_metadata//Producer LibreOffice 5.2 LibreOffice 6.2
pdf_data/cert_metadata//Subject Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware) Common Criteria Certification
pdf_data/cert_metadata//Title Certification Report BSI-DSZ-CC-0879-2018-V3 Certificate BSI-DSZ-CC-1025-V2-2019
pdf_data/cert_metadata/pdf_file_size_bytes 361225 286209
pdf_data/report_filename 0879V3a_pdf.pdf 1025V2a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0879-V3-2018 BSI-DSZ-CC-1025-V2-2019
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
pdf_data/report_frontpage/DE/ref_protection_profiles Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 6 4
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 3
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA2048: 1
  • RSA2048: 1
  • RSA4096: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V3-2018: 20
  • BSI-DSZ-CC-0879-: 1
  • BSI-DSZ-CC-0879-V2-2015: 1
  • BSI-DSZ-CC-1025-V2-2019: 20
  • BSI-DSZ-CC-1025-2018: 3
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
  • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • AGD:
    • AGD_ARM: 1
    • AGD_HRM: 1
    • AGD_PPUM: 1
    • AGD_PRM: 1
    • AGD_ACL: 1
    • AGD_SCL: 1
    • AGD_HSL: 1
    • AGD_CCL: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 5
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL 5+: 1
  • EAL6: 3
  • EAL6+: 3
  • EAL 6 augmented: 3
  • EAL6 augmented: 3
  • EAL 6: 4
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL6: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 5 4
pdf_data/report_keywords/cc_security_level/EAL/EAL6 3 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Security Target M7893 B11 Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0879-V3-2018, Version 3, 2017-10-23, “Evaluation: 1
    • Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
    • “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE of BSI-DSZ-CC-0879-V3-2018, Version 2.0, 2017-07- 25: 1
    • with Evaluation Assurance Level EAL6 augmented (EAL6+) M7893 B11”, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.03.008: 1
  • OutOfScope:
    • out of scope: 1
    • only modular exponentiatio n part) sizes, which are generally out of scope of evaluation in BSI scheme: 1
    • Level above 100 Bits verification (only modular exponentiatio n part) sizes, which are generally out of scope of evaluation in BSI scheme) 5 Cryptographic Primitive ECDSA signature generation [X962: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version V5, 2019-12-12, 1025- V2_ETR_191212_v4.pdf, TÜV: 1
    • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, TÜV Informatonstechnik GmbH (confidential document) [11] 32-bit Security Controller – V07 Security Guidelines, v1.01-2273, 2019-06-19, Infineon: 1
    • including optional Software Libraries and Flash Loader according Package 1 and Package 2” (confidential document), Infineon Technologies AG 7 Specifically all AIS referenced (in detail) in section B 9.1 29 / 34: 1
    • Standards Compliance Verification”, Version 2, 2019-09-27, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-1025-V2-2019 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Security Target M7893 B11 Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0879-V3-2018, Version 3, 2017-10-23, “Evaluation: 1
  • Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
  • “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE of BSI-DSZ-CC-0879-V3-2018, Version 2.0, 2017-07- 25: 1
  • with Evaluation Assurance Level EAL6 augmented (EAL6+) M7893 B11”, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.03.008: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version V5, 2019-12-12, 1025- V2_ETR_191212_v4.pdf, TÜV: 1
  • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, TÜV Informatonstechnik GmbH (confidential document) [11] 32-bit Security Controller – V07 Security Guidelines, v1.01-2273, 2019-06-19, Infineon: 1
  • including optional Software Libraries and Flash Loader according Package 1 and Package 2” (confidential document), Infineon Technologies AG 7 Specifically all AIS referenced (in detail) in section B 9.1 29 / 34: 1
  • Standards Compliance Verification”, Version 2, 2019-09-27, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-1025-V2-2019 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • CFB:
    • CFB: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 16
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 3
    • DPA: 3
  • FI:
    • physical tampering: 1
    • DFA: 3
  • other:
    • JIL: 4
  • SCA:
    • physical probing: 1
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • SPA: 3
  • DPA: 3
  • physical probing: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS 35: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 32: 1
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 45: 1
    • AIS 46: 1
    • AIS 47: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 2
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS1: 4
    • PKCS #1: 1
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS31: 5
  • RFC:
    • RFC5639: 4
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 25: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS 35: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 32: 1
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 45: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS31: 5
pdf_data/report_keywords/standard_id/BSI/AIS 25 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 3 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 25: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • Triple-DES: 3
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 3
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 11
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 3
  • 3DES: 1
  • TDES: 3
  • Triple-DES: 1
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 3 1
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 2
pdf_data/report_keywords/vendor/GD/G&D 1 2
pdf_data/report_keywords/vendor/Infineon/Infineon 25 3
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 8 28
pdf_data/report_metadata//CreationDate D:20180416135130+02'00' D:20191218141620+01'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6" "Infineon Technologies AG, Common Criteria, Certification, IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software, security controller"
pdf_data/report_metadata//ModDate D:20180416143909+02'00' D:20191218142701+01'00'
pdf_data/report_metadata//Producer LibreOffice 5.2 LibreOffice 6.2
pdf_data/report_metadata//Subject Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware) Common Criteria Certification
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0879-2018-V3 Certification Report BSI-DSZ-CC-1025-V2-2019
pdf_data/report_metadata/pdf_file_size_bytes 858784 498544
pdf_data/report_metadata/pdf_number_of_pages 31 34
pdf_data/st_filename 0879V3b_pdf.pdf 1025V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 9 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 25 19
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 10 9
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 6
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 6
pdf_data/st_keywords/cc_claims/O
  • O.RND: 1
  • O.TDES: 4
  • O.AES: 4
  • O.RND: 4
pdf_data/st_keywords/cc_claims/O/O.RND 1 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0084-2014: 4
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_FLR.1: 11
  • ALC_DVS.2: 3
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 1
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS: 3
  • ALC_DVS.2: 4
  • ALC_FLR.1: 11
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 3
  • ALC_DVS.1: 2
  • ALC_DEL: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 1 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 3 4
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL 1 9
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_INT 1 20
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ 1 9
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ 1 46
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD 1 8
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS 1 16
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 4 5
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 8
  • EAL6+: 125
  • EAL4+: 1
  • EAL 6: 1
  • EAL6 augmented: 4
  • EAL 6 augmented: 1
  • EAL6: 134
  • EAL6+: 131
  • EAL 6: 1
  • EAL6 augmented: 131
  • EAL 6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL6 8 134
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 4 131
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 125 131
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 4
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 14
    • FCS_RNG: 4
    • FCS_COP: 119
    • FCS_CKM: 81
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 33
    • FCS_CKM.4: 39
    • FCS_CKM.1: 43
    • FCS_CKM.2: 6
  • FDP:
    • FDP_ITT.1: 18
    • FDP_IFC.1: 17
    • FDP_ACC.1: 24
    • FDP_ACF.1: 21
    • FDP_SDI.1: 16
    • FDP_SDI.2: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 34
    • FDP_ITC.2: 34
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 6
    • FMT_LIM.2: 7
    • FMT_MSA.1: 19
    • FMT_MSA.3: 20
    • FMT_SMF.1: 16
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_CKM.4: 1
  • FPT:
    • FPT_TST.2: 35
    • FPT_TST: 3
    • FPT_TST.1: 12
    • FPT_TST.2.1: 2
    • FPT_FLS.1: 19
    • FPT_PHP.3: 25
    • FPT_ITT.1: 18
    • FPT_AMT.1: 1
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_SAS.1: 12
    • FAU_SAS: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 16
    • FCS_COP: 114
    • FCS_CKM: 76
    • FCS_RNG: 47
    • FCS_COP.1: 25
    • FCS_CKM.4: 31
    • FCS_CKM.1: 32
    • FCS_CKM.2: 6
  • FDP:
    • FDP_ACC.1: 27
    • FDP_ACF.1: 23
    • FDP_SDI.2: 13
    • FDP_SDC.1: 12
    • FDP_ITT.1: 14
    • FDP_IFC.1: 16
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
    • FDP_ACC: 17
    • FDP_ACF: 17
    • FDP_SDC: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 26
    • FDP_ITC.2: 26
    • FDP_SDI.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDC.1.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_AFC: 1
    • FDP_PHP.3: 1
  • FIA:
    • FIA_API.1: 13
    • FIA_API: 3
    • FIA_API.1.1: 1
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
  • FMT:
    • FMT_MSA.1: 17
    • FMT_MSA.3: 20
    • FMT_SMF.1: 15
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_LIM: 29
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_ACF: 1
  • FPT:
    • FPT_TST.2: 31
    • FPT_TST: 5
    • FPT_FLS.1: 20
    • FPT_PHP.3: 17
    • FPT_ITT.1: 15
    • FPT_TST.1: 11
    • FPT_TST.2.1: 1
    • FPT_ITC.1: 2
  • FRU:
    • FRU_FLT.2: 9
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 10
  • FAU_SAS: 4
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 12
  • FAU_SAS: 3
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 4 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 12
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 14
  • FCS_RNG: 4
  • FCS_COP: 119
  • FCS_CKM: 81
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_COP.1: 33
  • FCS_CKM.4: 39
  • FCS_CKM.1: 43
  • FCS_CKM.2: 6
  • FCS_RNG.1: 16
  • FCS_COP: 114
  • FCS_CKM: 76
  • FCS_RNG: 47
  • FCS_COP.1: 25
  • FCS_CKM.4: 31
  • FCS_CKM.1: 32
  • FCS_CKM.2: 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 81 76
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 43 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 39 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 119 114
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 33 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 4 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 14 16
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 18
  • FDP_IFC.1: 17
  • FDP_ACC.1: 24
  • FDP_ACF.1: 21
  • FDP_SDI.1: 16
  • FDP_SDI.2: 14
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 34
  • FDP_ITC.2: 34
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 27
  • FDP_ACF.1: 23
  • FDP_SDI.2: 13
  • FDP_SDC.1: 12
  • FDP_ITT.1: 14
  • FDP_IFC.1: 16
  • FDP_UCT.1: 16
  • FDP_UIT.1: 16
  • FDP_ACC: 17
  • FDP_ACF: 17
  • FDP_SDC: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 26
  • FDP_ITC.2: 26
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_AFC: 1
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 24 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 21 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 17 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 34 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 34 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 16 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 14 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 2 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 2
  • FMT_LIM.1: 6
  • FMT_LIM.2: 7
  • FMT_MSA.1: 19
  • FMT_MSA.3: 20
  • FMT_SMF.1: 16
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 17
  • FMT_MSA.3: 20
  • FMT_SMF.1: 15
  • FMT_LIM.1: 12
  • FMT_LIM.2: 11
  • FMT_LIM: 29
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_ACF: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 2 29
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 6 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 7 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 19 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.2: 35
  • FPT_TST: 3
  • FPT_TST.1: 12
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 18
  • FPT_AMT.1: 1
  • FPT_TST.2: 31
  • FPT_TST: 5
  • FPT_FLS.1: 20
  • FPT_PHP.3: 17
  • FPT_ITT.1: 15
  • FPT_TST.1: 11
  • FPT_TST.2.1: 1
  • FPT_ITC.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 20
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 18 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 3 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 12 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 35 31
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 3
    • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
    • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. Note 1: The cryptographic libraries RSA, EC and Toolbox are delivery options. Therefore the TOE: 1
    • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
pdf_data/st_keywords/cipher_mode/CFB/CFB 9 6
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 2 11
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 9
  • SHA1: 11
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 8
  • SHA-512: 2
  • SHA-2: 70
  • SHA256: 11
pdf_data/st_keywords/randomness/PRNG/PRNG 6 1
pdf_data/st_keywords/randomness/RNG/RND 2 5
pdf_data/st_keywords/randomness/RNG/RNG 9 25
pdf_data/st_keywords/randomness/TRNG/TRNG 11 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 7
    • SPA: 5
    • DPA: 7
  • FI:
    • Malfunction: 9
    • DFA: 6
    • fault induction: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 11
    • Side-channel: 1
    • side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
    • fault injection: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 9
  • DFA: 6
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/DFA 6 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 9 12
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 7
  • SPA: 5
  • DPA: 7
  • Leak-Inherent: 12
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 11
  • Side-channel: 1
  • side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 12
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 5 6
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 7 11
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 9
  • AIS32: 5
  • AIS32: 8
  • AIS31: 13
  • AIS20: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 9 13
pdf_data/st_keywords/standard_id/BSI/AIS32 5 8
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 1
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 197: 2
  • FIPS PUB 180-4: 4
  • FIPS PUB 197: 3
  • FIPS PUB 800-38: 2
  • FIPS 197: 4
  • FIPS PUB 140-2: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 2 4
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 4
  • ISO/IEC 10118-3: 3
  • ISO/IEC 18033-3: 3
  • ISO/IEC 11770-3: 3
  • ISO/IEC 14888-: 1
  • ISO/IEC 15946-1: 1
  • ISO/IEC 14888-3: 1
  • ISO/IEC 15946-2: 1
  • ISO/IEC 15946-3: 1
  • ISO/IEC 14443-4: 3
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 2
  • ISO/IEC 14888-3: 6
  • ISO/IEC 11770-3: 1
  • ISO/IEC 9798-2: 1
  • ISO/IEC 15946-1: 1
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 11770-3 3 1
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14888-3 1 6
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9797-1 4 2
pdf_data/st_keywords/standard_id/NIST
  • SP 800-67: 3
  • SP 800-38A: 6
  • SP 800-67: 5
  • SP 800-38A: 11
  • SP 800-108: 1
pdf_data/st_keywords/standard_id/NIST/SP 800-38A 6 11
pdf_data/st_keywords/standard_id/NIST/SP 800-67 3 5
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS#1: 8
  • PKCS #1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 8
pdf_data/st_keywords/standard_id/RFC
  • RFC3447: 4
  • RFC 5639: 2
  • RFC 3447: 1
  • RFC 5639: 1
pdf_data/st_keywords/standard_id/RFC/RFC 5639 2 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 58
  • AES: 50
  • AES-128: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 58 50
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 33
  • Triple-DES: 2
  • TDEA: 1
  • TDES: 27
  • Triple-DES: 4
  • TDEA: 3
  • TripleDES: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 33 27
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 22 29
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 1
  • CBC-MAC: 6
  • CBC-MAC: 8
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CBC-MAC 6 8
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 6 15
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 8 22
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 33 32
pdf_data/st_metadata
  • pdf_file_size_bytes: 1643326
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 124
  • /Title: Security Target Lite
  • /Author: Dr. Oleg Rudakov
  • /Subject: Security Target M7893 B11 Integrity Guard
  • /Keywords: Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO 90nm
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20171025172601+02'00'
  • /ModDate: D:20171025172601+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
  • pdf_file_size_bytes: 1901252
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 129
  • /Author: Noller
  • /Keywords: Infineon
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20190930143846+02'00'
  • /ModDate: D:20190930143846+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: http://www.infineon.com/, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation
pdf_data/st_metadata//Author Dr. Oleg Rudakov Noller
pdf_data/st_metadata//CreationDate D:20171025172601+02'00' D:20190930143846+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Word 2016
pdf_data/st_metadata//Keywords Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO 90nm Infineon
pdf_data/st_metadata//ModDate D:20171025172601+02'00' D:20190930143846+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Word 2016
pdf_data/st_metadata/pdf_file_size_bytes 1643326 1901252
pdf_data/st_metadata/pdf_number_of_pages 124 129
dgst f5eb065df94ceda9 2431b01a2c33e02f