name |
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
|
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software(S3FT9MF_20221219)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2018-04-03
|
2023-02-16
|
not_valid_after |
2023-04-03
|
2028-02-16
|
scheme |
DE
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2023_09en.pdf
|
status |
archived
|
active
|
manufacturer |
Infineon Technologies AG
|
Samsung Electronics Co., Ltd.
|
manufacturer_web |
https://www.infineon.com/
|
https://www.samsung.com
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_09.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3c_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_09.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
52a2a3dce7d04b560a1f6d2be7fe2b85d022f7587357a1a6b33a68a24b302282
|
120d113282f604377188f3a2976995aefa0fb9f6fa7b0bd6130688630557491d
|
state/cert/txt_hash |
b81c7665198bd25bd15303b862333cd0435dd2172797bc86a23a7067b6b658af
|
834e6e1925beee7a5564796b761c6668ab1983aaba34b655b2cec2568a2e0242
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
False
|
state/report/pdf_hash |
7df3ce72df5a402ee7dd1b434497162f9c0b840f8bee3d16357beae2051d1203
|
a1a2c08e49684e39cf237c2ce3ae3a5d917a9d74e4e529b64e9def6e549be866
|
state/report/txt_hash |
e25d350eb8ecfa0911c984a1c2a53c066cd9278285e5b2f526c168f43acd54b7
|
69d15de8ca3115ebb4d06df75b370fee2eb2cf1ee2077b6b646ccdd6c1fc01fa
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
False
|
state/st/pdf_hash |
80b6285501f7c4326337d4782ae6f522567c6adbc6c6ada5c32a638f4492192e
|
a3aad4175054424bff4a90b6a7956fc8e7be1cdb6bba271a1cbe1ea33dd6a5d9
|
state/st/txt_hash |
d7b08c9f5c2995c80702660a9626e220cb623cac113ca09413f26df4281162f1
|
d967e0acd96510fc9de740d15c49399ebe0dbd82caf0a0413432246d39f01e05
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0879-V3-2018
|
ANSSI-CC-2023/09
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.01, 2.02.010, 2.03.008, 1.03.006 |
16 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0879-V2-2015 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V3-2020, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1071-V7-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0879-V2-2015 |
None
|
heuristics/scheme_data |
None
|
- product:
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software(S3FT9MF_20221219)
- url:
https://cyber.gouv.fr/produits-certifies/s3ft9mfs3ft9mts3ft9ms-16-bit-risc-microcontroller-smart-card-optional-secure-2
- description:
Le produit évalué est la famille de microcontrôleurs « S3FT9MF/S3FT9MT/S3FT9MS, version S3FT9MF_20221219 » développée par SAMSUNG ELECTRONICS.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont m
- sponsor:
SAMSUNG ELECTRONICS
- developer:
SAMSUNG ELECTRONICS
- cert_id:
ANSSI-CC-2023/09
- level:
EAL6+
- expiration_date:
15 Février 2028
- enhanced:
- cert_id:
ANSSI-CC-2023/09
- certification_date:
16/02/2023
- expiration_date:
15/02/2028
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
SAMSUNG ELECTRONICS
- sponsor:
SAMSUNG ELECTRONICS
- evaluation_facility:
CEA - LETI
- level:
EAL6+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages :
“Authentication of the security IC”, “TDES”, “AES”,
“Loader dedicated for usage in Secured Environment only”,
“Loader dedicated for usage by authorized users only”
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ASE_TSS.2
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_09.pdf
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2019/04, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
BSI-DSZ-CC-1071-2019, ANSSI-CC-2024/13, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
0879V3c_pdf.pdf
|
certificat-cc-2023_09.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0879-V3-2018:
1
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI:
1
- CEA-LETI:
1
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
- Infineon:
- Infineon:
1
- Infineon Technologies AG:
1
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
361225
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20180416135147+02'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6"
- /ModDate:
D:20180416143812+02'00'
- /Producer:
LibreOffice 5.2
- /Subject:
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
- /Title:
Certification Report BSI-DSZ-CC-0879-2018-V3
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
0879V3a_pdf.pdf
|
anssi-cc-2023_09.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0879-V3-2018
- cert_item:
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0879-V3-2018:
20
- BSI-DSZ-CC-0879-:
1
- BSI-DSZ-CC-0879-V2-2015:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0035-2007:
2
- BSI-CC-PP- 0035-2007:
1
|
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_LCD.1: 1
- ALC_TAT.3: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 6:
5
- EAL 5:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL 5+:
1
- EAL6:
3
- EAL6+:
3
- EAL 6 augmented:
3
- EAL6 augmented:
3
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6: 5
- EAL 5: 4
- EAL 2: 2
- EAL 1: 1
- EAL 4: 1
- EAL 2+: 1
- EAL 5+: 1
- EAL6:
3
- EAL6+: 3
- EAL 6 augmented: 3
- EAL6 augmented: 3
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
3
|
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Security Target M7893 B11 Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0879-V3-2018, Version 3, 2017-10-23, “Evaluation:
1
- Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9:
1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE of BSI-DSZ-CC-0879-V3-2018, Version 2.0, 2017-07- 25:
1
- with Evaluation Assurance Level EAL6 augmented (EAL6+) M7893 B11”, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.03.008:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing:
1
- SPA:
3
- DPA:
3
- FI:
- physical tampering:
1
- DFA:
3
- other:
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
3
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 23:
1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 45:
1
- AIS 46:
1
- AIS 47:
1
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
7
|
1
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
5
|
1
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
25
- Infineon Technologies AG:
8
- Infineon Technologies:
1
- GD:
- G&D:
1
- Giesecke & Devrient:
1
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
858784
- pdf_is_encrypted:
False
- pdf_number_of_pages:
31
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20180416135130+02'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6"
- /ModDate:
D:20180416143909+02'00'
- /Producer:
LibreOffice 5.2
- /Subject:
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
- /Title:
Certification Report BSI-DSZ-CC-0879-2018-V3
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
None
|
pdf_data/st_filename |
0879V3b_pdf.pdf
|
anssi-cible-2023_09en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
17
|
22
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH |
9
|
18
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
25
|
24
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
10
|
6
|
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA |
1
|
7
|
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/O |
|
- O.RSA: 8
- O.ECDSA: 6
- O.ECDH: 7
- O.SHA: 7
- O.RND:
6
- O.TDES: 7
- O.AES: 5
- O.MEM_ACCESS: 1
|
pdf_data/st_keywords/cc_claims/O/O.RND |
1
|
6
|
pdf_data/st_keywords/cc_claims/T/T.RND |
1
|
5
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-CC-PP-0084:
2
- BSI-PP-0084:
1
- BSI-CC-PP-0084-:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_SPM:
2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1:
2
- ADV_FSP:
1
- ADV_FSP.4:
4
- ADV_CMC.5:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_DVS:
1
- ALC_FLR.1:
11
- ALC_DVS.2:
3
- ALC_CMC.5:
2
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
1
- ALC_CMC:
1
- ALC_CMC.4:
1
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2:
3
- AVA:
- ASE:
- ASE_INT:
1
- ASE_CCL:
1
- ASE_SPD:
1
- ASE_OBJ:
1
- ASE_ECD:
1
- ASE_REQ:
1
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
2
- ADV_IMP:
1
- ADV_ARC.1:
5
- ADV_SPM.1:
2
- ADV_FSP.5:
3
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_FSP.4:
1
- AGD:
- AGD_OPE:
1
- AGD_PRE:
1
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_DVS.2:
2
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_CMS:
2
- ALC_CMC:
1
- ALC_CMC.5:
1
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS.4:
1
- ATE:
- ATE_COV:
1
- ATE_COV.3:
1
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_TSS.2:
11
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
2
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_REQ.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_SPM: 2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1: 2
- ADV_FSP:
1
- ADV_FSP.4:
4
- ADV_CMC.5: 1
|
- ADV_ARC: 1
- ADV_FSP:
2
- ADV_IMP:
1
- ADV_ARC.1:
5
- ADV_SPM.1:
2
- ADV_FSP.5:
3
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_FSP.4:
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
5
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP |
1
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 |
4
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 |
6
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.5 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE: 1
- AGD_PRE: 1
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS:
1
- ALC_FLR.1: 11
- ALC_DVS.2:
3
- ALC_CMC.5:
2
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
1
- ALC_CMC:
1
- ALC_CMC.4: 1
|
- ALC_DVS.2:
2
- ALC_DEL: 1
- ALC_DVS:
1
- ALC_CMS:
2
- ALC_CMC:
1
- ALC_CMC.5:
1
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS.4:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.5 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS |
2
|
2
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
2
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 1
- ASE_CCL: 1
- ASE_SPD: 1
- ASE_OBJ: 1
- ASE_ECD: 1
- ASE_REQ: 1
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1: 1
- ASE_TSS: 1
|
- ASE_TSS.2: 11
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
2
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_REQ.1: 1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2: 3
|
- ATE_COV:
1
- ATE_COV.3:
1
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 |
4
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
5
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL6:
8
- EAL6+:
125
- EAL4+: 1
- EAL 6: 1
- EAL6 augmented:
4
- EAL 6 augmented: 1
|
- EAL6+:
2
- EAL6:
5
- EAL 4: 1
- EAL 5: 2
- EAL6 augmented:
1
- EAL 4 augmented: 1
- EAL 5 augmented: 2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 |
8
|
5
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented |
4
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ |
125
|
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
14
- FCS_RNG:
4
- FCS_COP:
119
- FCS_CKM:
81
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_COP.1:
33
- FCS_CKM.4:
39
- FCS_CKM.1:
43
- FCS_CKM.2:
6
- FDP:
- FDP_ITT.1:
18
- FDP_IFC.1:
17
- FDP_ACC.1:
24
- FDP_ACF.1:
21
- FDP_SDI.1:
16
- FDP_SDI.2:
14
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
34
- FDP_ITC.2:
34
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FMT:
- FMT_LIM:
2
- FMT_LIM.1:
6
- FMT_LIM.2:
7
- FMT_MSA.1:
19
- FMT_MSA.3:
20
- FMT_SMF.1:
16
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_CKM.4:
1
- FPT:
- FPT_TST.2:
35
- FPT_TST:
3
- FPT_TST.1:
12
- FPT_TST.2.1:
2
- FPT_FLS.1:
19
- FPT_PHP.3:
25
- FPT_ITT.1:
18
- FPT_AMT.1:
1
- FRU:
|
- FAU:
- FAU_SAS:
8
- FAU_GEN:
2
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FAU_GEN.1:
1
- FCS:
- FCS_RNG:
25
- FCS_RNG.1:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
21
- FCS_COP:
51
- FCS_CKM.1:
40
- FCS_CKM.4:
25
- FCS_CKM:
38
- FCS_CKM.2:
4
- FCS_CMK:
5
- FDP:
- FDP_SDC:
4
- FDP_ACF:
14
- FDP_SDC.1:
14
- FDP_SDI:
1
- FDP_SDC.1.1:
2
- FDP_SDI.2:
8
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITT.1:
18
- FDP_ITT.1.1:
1
- FDP_ACC.1:
20
- FDP_IFC.1:
23
- FDP_IFC.1.1:
1
- FDP_IFF.1:
3
- FDP_ACF.1:
17
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
21
- FDP_ITC.2:
21
- FDP_UCT.1:
9
- FDP_UCT.1.1:
1
- FDP_UIT.1:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ACC:
10
- FDP_SDI.1:
1
- FDP_IFC:
1
- FDP_ITT:
1
- FIA:
- FIA_API:
6
- FIA_API.1:
12
- FIA_API.1.1:
2
- FMT:
- FMT_LIM:
22
- FMT_LIM.1:
28
- FMT_LIM.2:
32
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
16
- FMT_MSA.1:
12
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_SMF.1:
9
- FMT_SMF.1.1:
1
- FMT_MSA:
2
- FMT_SMF:
1
- FPT:
- FPT_FLS.1:
22
- FPT_FLS.1.1:
1
- FPT_PHP.3:
20
- FPT_PHP.3.1:
1
- FPT_PHP:
3
- FPT_ITT.1:
16
- FPT_ITT.1.1:
1
- FPT_FLS:
1
- FPT_ITT:
1
- FRU:
- FRU_FLT.2:
17
- FRU_FLT.1:
1
- FRU_FLT.2.1:
1
- FRU_FLT:
1
- FTP:
- FTP_ITC.1:
13
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_SAS:
8
- FAU_GEN:
2
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FAU_GEN.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
10
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
14
- FCS_RNG:
4
- FCS_COP:
119
- FCS_CKM:
81
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_COP.1:
33
- FCS_CKM.4:
39
- FCS_CKM.1:
43
- FCS_CKM.2:
6
|
- FCS_RNG:
25
- FCS_RNG.1:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
21
- FCS_COP:
51
- FCS_CKM.1:
40
- FCS_CKM.4:
25
- FCS_CKM:
38
- FCS_CKM.2:
4
- FCS_CMK: 5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
81
|
38
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
43
|
40
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
39
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
119
|
51
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
33
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
4
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
14
|
18
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITT.1:
18
- FDP_IFC.1:
17
- FDP_ACC.1:
24
- FDP_ACF.1:
21
- FDP_SDI.1:
16
- FDP_SDI.2:
14
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
34
- FDP_ITC.2:
34
- FDP_SDI.1.1: 1
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
|
- FDP_SDC: 4
- FDP_ACF: 14
- FDP_SDC.1: 14
- FDP_SDI: 1
- FDP_SDC.1.1: 2
- FDP_SDI.2:
8
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITT.1:
18
- FDP_ITT.1.1: 1
- FDP_ACC.1:
20
- FDP_IFC.1:
23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ACF.1:
17
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
21
- FDP_ITC.2:
21
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ACC: 10
- FDP_SDI.1:
1
- FDP_IFC: 1
- FDP_ITT: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
24
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
21
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
17
|
23
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
34
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
34
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
16
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
14
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
2
- FMT_LIM.1:
6
- FMT_LIM.2:
7
- FMT_MSA.1:
19
- FMT_MSA.3:
20
- FMT_SMF.1:
16
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_CKM.4: 1
|
- FMT_LIM:
22
- FMT_LIM.1:
28
- FMT_LIM.2:
32
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 2
- FMT_MSA.3:
16
- FMT_MSA.1:
12
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_SMF.1:
9
- FMT_SMF.1.1:
1
- FMT_MSA: 2
- FMT_SMF: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
2
|
22
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
6
|
28
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
7
|
32
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
19
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
20
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
16
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2: 35
- FPT_TST: 3
- FPT_TST.1: 12
- FPT_TST.2.1: 2
- FPT_FLS.1:
19
- FPT_PHP.3:
25
- FPT_ITT.1:
18
- FPT_AMT.1: 1
|
- FPT_FLS.1:
22
- FPT_FLS.1.1: 1
- FPT_PHP.3:
20
- FPT_PHP.3.1: 1
- FPT_PHP: 3
- FPT_ITT.1:
16
- FPT_ITT.1.1: 1
- FPT_FLS: 1
- FPT_ITT: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
19
|
22
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
18
|
16
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
25
|
20
|
pdf_data/st_keywords/cc_sfr/FRU |
|
- FRU_FLT.2:
17
- FRU_FLT.1: 1
- FRU_FLT.2.1: 1
- FRU_FLT: 1
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 |
7
|
17
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB |
16
|
3
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
- Key Agreement:
3
- Key agreement: 2
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement |
3
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-192:
6
- P-224:
6
- P-256:
6
- P-384:
6
- secp192k1:
3
- secp192r1:
3
- secp224k1:
3
- secp224r1:
3
- secp256k1:
3
- secp256r1:
3
- secp384r1:
3
- Brainpool:
- brainpoolP192r1:
3
- brainpoolP192t1:
3
- brainpoolP224r1:
3
- brainpoolP224t1:
3
- brainpoolP256r1:
3
- brainpoolP256t1:
3
- brainpoolP320r1:
3
- brainpoolP320t1:
3
- brainpoolP384r1:
3
- brainpoolP384t1:
3
- brainpoolP512r1:
3
- brainpoolP512t1:
3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256:
8
- SHA-512:
2
- SHA-2:
70
- MD:
|
- SHA:
- SHA1:
- SHA2:
- SHA224:
6
- SHA256:
6
- SHA384:
6
- SHA512:
5
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256:
8
- SHA-512:
2
- SHA-2:
70
|
- SHA224:
6
- SHA256:
6
- SHA384:
6
- SHA512:
5
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
2
|
11
|
pdf_data/st_keywords/randomness/RNG/RNG |
9
|
8
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
11
|
1
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
11
- Physical Probing:
2
- physical probing:
1
- side channel:
7
- SPA:
5
- DPA:
7
- FI:
- Malfunction:
9
- DFA:
6
- fault induction:
1
|
- SCA:
- Leak-Inherent:
24
- Physical Probing:
4
- physical probing:
9
- Physical probing:
2
- side-channel:
3
- side channel:
2
- DPA:
6
- SPA:
5
- timing attacks:
1
- timing attack:
2
- FI:
- physical tampering:
3
- Malfunction:
26
- malfunction:
13
- DFA:
5
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Malfunction:
9
- DFA:
6
- fault induction: 1
|
- physical tampering: 3
- Malfunction:
26
- malfunction: 13
- DFA:
5
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA |
6
|
5
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
9
|
26
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
11
- Physical Probing:
2
- physical probing:
1
- side channel:
7
- SPA:
5
- DPA:
7
|
- Leak-Inherent:
24
- Physical Probing:
4
- physical probing:
9
- Physical probing: 2
- side-channel: 3
- side channel:
2
- DPA:
6
- SPA:
5
- timing attacks: 1
- timing attack: 2
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
7
|
6
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
11
|
24
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
2
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
5
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
1
|
9
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
7
|
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197:
2
- FIPS PUB 180-4:
4
- FIPS PUB 197:
3
- FIPS PUB 800-38:
2
- NIST:
- SP 800-67:
3
- SP 800-38A:
6
- PKCS:
- BSI:
- RFC:
- RFC3447:
4
- RFC 5639:
2
- RFC 3447:
1
- ISO:
- ISO/IEC 18092:
2
- ISO/IEC 7816-3:
1
- ISO/IEC 9797-1:
4
- ISO/IEC 10118-3:
3
- ISO/IEC 18033-3:
3
- ISO/IEC 11770-3:
3
- ISO/IEC 14888-:
1
- ISO/IEC 15946-1:
1
- ISO/IEC 14888-3:
1
- ISO/IEC 15946-2:
1
- ISO/IEC 15946-3:
1
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
1
|
- FIPS:
- FIPS PUB 180-3:
6
- FIPS197:
1
- FIPS 197:
1
- BSI:
- CC:
- CCMB-2017-04-001:
3
- CCMB-2017-04-002:
3
- CCMB-2017-04-003:
3
- CCMB-2017-04-004:
3
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
9
|
10
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 |
2
|
3
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 |
2
|
3
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 |
2
|
3
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 |
1
|
3
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 197:
2
- FIPS PUB 180-4: 4
- FIPS PUB 197: 3
- FIPS PUB 800-38: 2
|
- FIPS PUB 180-3: 6
- FIPS197: 1
- FIPS 197:
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 |
2
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
58
|
30
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
33
|
16
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
2
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
22
|
11
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC |
1
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
33
- Infineon Technologies:
8
- Infineon:
6
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1643326
- pdf_is_encrypted:
False
- pdf_number_of_pages:
124
- /Title:
Security Target Lite
- /Author:
Dr. Oleg Rudakov
- /Subject:
Security Target M7893 B11 Integrity Guard
- /Keywords:
Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO 90nm
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20171025172601+02'00'
- /ModDate:
D:20171025172601+02'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
|
None
|
dgst |
f5eb065df94ceda9
|
f1a6d066601a90bd
|