This page was not yet optimized for use on mobile devices.
SECORA™ ID v2.01 (SLJ38Gxymm1ap)
CSV information
Status | active |
---|---|
Valid from | 20.12.2024 |
Valid until | 20.12.2029 |
Scheme | 🇳🇱 NL |
Manufacturer | Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1 |
Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-2400062-01-CR
Certificate
Extracted keywords
Vendor
Infineon Technologies AGSecurity level
EAL6, EAL2, EAL7, EAL6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLRCertificates
NSCIB-CC-2400062-01, NSCIB-2400062-01Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
Title | NSCIB Certificate |
---|---|
Author | Gebruiker |
Creation date | D:20241224155355+00'00' |
Modification date | D:20241224155355+00'00' |
Pages | 1 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA256, SHA224, SHA384, SHA512, SHA-2Schemes
MAC, Key agreementProtocols
PACERandomness
RNGVendor
Infineon Technologies AGSecurity level
EAL4, EAL6, EAL6+, EAL6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5Certificates
BSI-DSZ-CC-1169-V4-2024, NSCIB-CC-2400062-01-CR, NSCIB-2400062-01Evaluation facilities
SGS, SGS Brightsight, Brightsight, TÜV InformationstechnikSide-channel analysis
side-channel, Side channel, Fault Injection, JIL-AAPS, JILStandards
PKCS#1, AIS31, AIS 36File metadata
Title | Certification Report |
---|---|
Author | Gebruiker |
Creation date | D:20241224155204+00'00' |
Modification date | D:20241224155204+00'00' |
Pages | 12 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Frontpage
Certificate ID | NSCIB-CC-2400062-01-CR |
---|---|
Certified item | SECORA™ ID v2.01 (SLJ38Gxymm1ap |
Certification lab | SGS Brightsight B.V. |
Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-1169-V4-2024 - active - IFX_CCI_00003Bh, 000043h, 00005Dh, 00005Eh, 00005Fh, 000060h, 000061h, 000062h, 000063h, 000064h, design step S11 with firmware 80.309.05.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000, optional ACL v3.33.003 and v3.34.000 and v3.35.001, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA1, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-256, SHA-2Schemes
MAC, Key agreementProtocols
PACERandomness
RNGBlock cipher modes
ECB, CBC, CTRJavaCard API constants
ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, TYPE_ACCESSVendor
Infineon Technologies AG, Infineon, Infineon TechnologiesSecurity level
EAL6, EAL 6, EAL6+, EAL 6+, EAL6 augmented, EAL 6 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CM_DATA, D.IFU_ADDITIONAL_CODE, D.APP_KEY, D.JCS_KEYS, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.ARRAY_VIEWS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.COMMUNICATION, O.SCP, O.CARD-MANAGEMENT, O.SAND_BOX, O.IFU_SECURE_LOAD_ACODE, O.IFU_CONFID_ADDITIONAL_CODE, O.IFU_SECURE_AC_ACTIVATION, O.IFU_TOE_IDENTIFICATION, O.VERIFICATION, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.CODE_PKG, O.RECOVERY, O.CARD-, O.AES, O.TDES, T.COMMUNICATION, T.RNG, T.UNAUTHORIZED_CARD_MNGT, T.LIFE_CYCLE, T.SAND_BOX, T.CONFID_IFU, T.INTEG_IFU, T.UNAUTHORIZED_IFU, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.PHYSICAL, T.OBJ-DELETION, T.UNAUTHORIZED_CA, T.INTEG-JCS-, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.IFU_OS_UPDATE_EVIDENCE, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.SAND_BOX_ACCESS, OP.SAND_BOX_ACCESS_SFR, OP.ARRAY_T_LOAD, OP.PUTFIELD, OP.PUTSTATIC, OE.CARD-MANAGEMENT, OE.SCP, OE.IFU_SECURE_ACODE_MANAGEMENT, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.IFU_OS_UPDATE_EVIDENCE, OE.CODE-, OE.IFU_SECURE_ACODE_MANAGEM, OSP.VERIFICATION, OSP.SAND_BOXSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.5, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DVS.2, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_COP, FCS_RNG, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ITC, FDP_UIT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_ITC.2, FDP_UIT.1, FDP_ACC.1, FDP_IFC.2, FDP_IFF.1.4, FDP_IFF.1.2, FDP_ITC.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MSA.1, FMT_MSA.3, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MSA.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_TDC.1, FPT_RCV, FPT_FLS, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0084-2014, BSI-CC-PP-0090-2016Certificates
BSI-DSZ-CC-1169-V4-2024, NSCIB-CC-2400062-01Side-channel analysis
physical probing, side channel, DPA, physical tampering, malfunctionStandards
FIPS 186-4, FIPS 197, FIPS PUB 198-1, FIPS 180-4, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38B, PKCS#1, AIS 31, RFC 5639, ISO/IEC 9797-1, ISO/IEC 9797, ICAO, SCP 02, SCP 03, SCP02, SCP03File metadata
Title | SECORA™ ID SLJ38G v2.01 Security Target |
---|---|
Keywords | Infineon |
Author | Kalaiselvam Suruddaiyan;Infineon Technologies AG |
Creation date | D:20241219111131+01'00' |
Modification date | D:20241219111131+01'00' |
Pages | 109 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-1169-V4-2024 - active - IFX_CCI_00003Bh, 000043h, 00005Dh, 00005Eh, 00005Fh, 000060h, 000061h, 000062h, 000063h, 000064h, design step S11 with firmware 80.309.05.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000, optional ACL v3.33.003 and v3.34.000 and v3.35.001, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- NSCIB-CC-2400086-01-CR - active - ePassport configuration of SECORA™ ID v2.01 Infineon Applet Collection - eMRTD V2.0
Heuristics
Certificate ID: NSCIB-CC-2400062-01-CR
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
NXP SN330 A0 Series - Secure Element SN330_SE A0.1.000 J10 | NSCIB-CC-2400063-01-CR | Compare |
Scheme data ?
Cert Id | NSCIB-CC-2400062-01-CR | |
---|---|---|
Certification Date | 20.12.2024 | |
Status | Issued | |
Product | SECORA™ ID v2.01 (SLJ38Gxymm1ap) | |
Developer | Infineon Technologies AG | |
Evaluation Facility | SGS Brightsight | |
Level | EAL6 + ALC_FLR.1 | |
Cert Link | https://trustcb.com/download/?wpdmdl=4808 | |
Report Link | https://trustcb.com/download/?wpdmdl=4809 | |
Target Link | https://trustcb.com/download/?wpdmdl=4810 |
References
Loading...
Updates
-
07.07.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-2400086-01-CR']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-2400086-01-CR']}}
data.
- The st_references property was updated, with the
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['7f886b64878b68c1']}, 'eal': 'EAL6+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
03.02.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SECORA™ ID v2.01 (SLJ38Gxymm1ap) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-Cert.pdf",
"dgst": "e2c862ad74a05e1e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2400062-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.01"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"7f886b64878b68c1"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1169-V4-2024"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1169-V2-2022",
"BSI-DSZ-CC-1169-V4-2024",
"BSI-DSZ-CC-1169-V3-2024"
]
}
},
"scheme_data": {
"cert_id": "NSCIB-CC-2400062-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=4808",
"certification_date": "2024-12-20",
"developer": "Infineon Technologies AG",
"evaluation_facility": "SGS Brightsight",
"level": "EAL6 + ALC_FLR.1",
"product": "SECORA\u2122 ID v2.01 (SLJ38Gxymm1ap)",
"report_link": "https://trustcb.com/download/?wpdmdl=4809",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=4810"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2400086-01-CR"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1169-V4-2024"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2400086-01-CR"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1169-V4-2024"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "SECORA\u2122 ID v2.01 (SLJ38Gxymm1ap)",
"not_valid_after": "2029-12-20",
"not_valid_before": "2024-12-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2400062-01-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2400062-01": 1,
"NSCIB-CC-2400062-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Gebruiker",
"/CreationDate": "D:20241224155355+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20241224155355+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 177857,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2400062-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2400062-01-CR",
"cert_item": "SECORA\u2122 ID v2.01 (SLJ38Gxymm1ap",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Infineon Technologies AG"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1169-V4-2024": 2
},
"NL": {
"NSCIB-2400062-01": 1,
"NSCIB-CC-2400062-01-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR.1": 2
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL6": 2,
"EAL6 augmented": 2,
"EAL6+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 3
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
},
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-2": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 2,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1
},
"SCA": {
"Side channel": 1,
"side-channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 2
}
},
"standard_id": {
"BSI": {
"AIS 36": 2,
"AIS31": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Gebruiker",
"/CreationDate": "D:20241224155204+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20241224155204+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 273112,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nscib.nl/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]",
"https://www.sogis.eu/",
"https://trustcb.com/common-criteria/nscib/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "NSCIB-CC-2400062-01-ST_1.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1169-V4-2024": 2
},
"NL": {
"NSCIB-CC-2400062-01": 1
}
},
"cc_claims": {
"A": {
"A.CAP_FILE": 3,
"A.DELETION": 1,
"A.IFU_OS_UPDATE_EVIDENCE": 4,
"A.VERIFICATION": 3
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 6,
"D.APP_I_DATA": 7,
"D.APP_KEY": 1,
"D.APP_KEYS": 4,
"D.CM_DATA": 4,
"D.CRYPTO": 4,
"D.IFU_ADDITIONAL_CODE": 18,
"D.JCS_CODE": 6,
"D.JCS_DATA": 9,
"D.JCS_KEYS": 1,
"D.PIN": 6,
"D.SEC_DATA": 7
},
"O": {
"O.AES": 1,
"O.ALARM": 13,
"O.APPLET": 16,
"O.ARRAY_VIEWS_CONFID": 6,
"O.ARRAY_VIEWS_INTEG": 5,
"O.CARD-": 1,
"O.CARD-MANAGEMENT": 47,
"O.CIPHER": 8,
"O.CODE_CAP_FILE": 12,
"O.CODE_PKG": 2,
"O.COMMUNICATION": 19,
"O.DELETION": 7,
"O.FIREWALL": 19,
"O.GLOBAL_ARRAYS_CONFID": 7,
"O.GLOBAL_ARRAYS_INTEG": 7,
"O.IFU_CONFID_ADDITIONAL_CODE": 9,
"O.IFU_SECURE_AC_ACTIVATION": 7,
"O.IFU_SECURE_LOAD_ACODE": 20,
"O.IFU_TOE_IDENTIFICATION": 10,
"O.INSTALL": 10,
"O.JAVAOBJECT": 42,
"O.KEY-MNGT": 7,
"O.LOAD": 15,
"O.NATIVE": 9,
"O.OBJ-DELETION": 6,
"O.OPERATE": 17,
"O.PIN-MNGT": 8,
"O.REALLOCATION": 7,
"O.RECOVERY": 1,
"O.RESOURCES": 8,
"O.RNG": 9,
"O.SAND_BOX": 15,
"O.SCP": 40,
"O.SID": 15,
"O.TDES": 1,
"O.TRANSACTION": 8,
"O.VERIFICATION": 1
},
"OE": {
"OE.CAP_FILE": 5,
"OE.CARD-MANAGEMENT": 1,
"OE.CODE-": 1,
"OE.CODE-EVIDENCE": 11,
"OE.IFU_OS_UPDATE_EVIDENCE": 4,
"OE.IFU_SECURE_ACODE_MANAGEM": 1,
"OE.IFU_SECURE_ACODE_MANAGEMENT": 4,
"OE.SCP": 3,
"OE.VERIFICATION": 25
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 3,
"OP.ARRAY_T_ALOAD": 2,
"OP.ARRAY_T_ASTORE": 3,
"OP.ARRAY_T_LOAD": 1,
"OP.CREATE": 6,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 6,
"OP.PUT": 4,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.SAND_BOX_ACCESS": 1,
"OP.SAND_BOX_ACCESS_SFR": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.SAND_BOX": 2,
"OSP.VERIFICATION": 3
},
"R": {
"R.JAVA": 12
},
"T": {
"T.COMMUNICATION": 4,
"T.CONFID-APPLI-DATA": 6,
"T.CONFID-JCS-CODE": 4,
"T.CONFID-JCS-DATA": 6,
"T.CONFID_IFU": 6,
"T.DELETION": 4,
"T.EXE-CODE": 6,
"T.INSTALL": 4,
"T.INTEG-APPLI-": 5,
"T.INTEG-APPLI-CODE": 6,
"T.INTEG-APPLI-DATA": 7,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 4,
"T.INTEG-JCS-DATA": 5,
"T.INTEG_IFU": 7,
"T.LIFE_CYCLE": 4,
"T.NATIVE": 3,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 4,
"T.RESOURCES": 5,
"T.RNG": 5,
"T.SAND_BOX": 5,
"T.SID": 9,
"T.UNAUTHORIZED_CA": 1,
"T.UNAUTHORIZED_CARD_MNGT": 3,
"T.UNAUTHORIZED_IFU": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0090-2016": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 7,
"ADV_IMP.1": 8,
"ADV_INT.2": 1,
"ADV_SPM.1": 7,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 5,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 2,
"ALC_FLR.1": 3,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 7
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 2,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 12,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 2
},
"FCO": {
"FCO_NRO": 9,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_COP": 19,
"FCS_COP.1": 14,
"FCS_RNG": 7,
"FCS_RNG.1": 19
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 11,
"FDP_ACC.2": 11,
"FDP_ACF": 24,
"FDP_ACF.1": 26,
"FDP_IFC": 32,
"FDP_IFC.1": 11,
"FDP_IFC.2": 2,
"FDP_IFF": 29,
"FDP_IFF.1": 17,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.4": 1,
"FDP_ITC": 15,
"FDP_ITC.1": 1,
"FDP_ITC.2": 11,
"FDP_ITT.1": 1,
"FDP_RIP": 47,
"FDP_RIP.1": 9,
"FDP_ROL": 15,
"FDP_ROL.1": 4,
"FDP_SDC.1": 2,
"FDP_SDI": 6,
"FDP_SDI.2": 4,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 5,
"FIA_ATD.1": 1,
"FIA_UAU": 23,
"FIA_UAU.1": 4,
"FIA_UAU.4": 1,
"FIA_UID": 30,
"FIA_UID.1": 11,
"FIA_UID.2": 1,
"FIA_USB": 5,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 110,
"FMT_MSA.1": 17,
"FMT_MSA.2": 1,
"FMT_MSA.3": 25,
"FMT_MSA.3.1": 1,
"FMT_MTD": 10,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_SMF": 37,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 37,
"FMT_SMR.1": 23,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 28,
"FPT_FLS.1": 15,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_RCV": 6,
"FPT_RCV.3": 4,
"FPT_TDC.1": 6,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 12,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 12
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5,
"SHA1": 1
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 1,
"SHA-256": 1,
"SHA224": 7,
"SHA256": 11,
"SHA384": 8,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"EC": {
"ALG_EC_SVDP_DH_PLAIN": 1,
"ALG_EC_SVDP_DH_PLAIN_XY": 1
}
},
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 1
},
"org": {
"org.globalplatform": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 44
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 3
},
"SCA": {
"DPA": 1,
"physical probing": 2,
"side channel": 2
}
},
"standard_id": {
"BSI": {
"AIS 31": 4
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 186-4": 4,
"FIPS 197": 6,
"FIPS PUB 198-1": 3
},
"ICAO": {
"ICAO": 7
},
"ISO": {
"ISO/IEC 9797": 2,
"ISO/IEC 9797-1": 7
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-67": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 5639": 3
},
"SCP": {
"SCP 02": 1,
"SCP 03": 1,
"SCP02": 3,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10
}
},
"DES": {
"3DES": {
"TDES": 9
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 7,
"Infineon Technologies": 6,
"Infineon Technologies AG": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Kalaiselvam Suruddaiyan;Infineon Technologies AG",
"/CreationDate": "D:20241219111131+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/Keywords": "Infineon",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ActionId": "e0f13a61-3a8e-4be9-ba91-693349c4ba23",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ContentBits": "0",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Enabled": "true",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Method": "Standard",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Name": "a15a25aa-e944-415d-b7a7-40f6b9180b6b",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SetDate": "2023-05-03T10:08:12Z",
"/MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SiteId": "eeb8d0e8-3544-41d3-aac6-934c309faf5a",
"/ModDate": "D:20241219111131+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Title": "SECORA\u2122 ID SLJ38G v2.01 Security Target",
"pdf_file_size_bytes": 2218254,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.infineon.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 109
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400062-01-ST_1.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aa7cf032c378aaec07e30a93834dba549b7f00312d2aad64090d486e6a7b4a55",
"txt_hash": "b4fc3c7aabd490f363ee37c1babcbf1d22cccebcfc95e39bcef583efe963e9db"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "849f76676310bac515301569ec500541aedf48776c682ea2f2b7959cff21e66d",
"txt_hash": "bf9c974c248ddafba21044a49bcf7b576e4061840e40db5796a6fa62f4743588"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3ae8f344b391b273f40ab0f780834f63384834408f7ccfdd9cad7ae47289d1e7",
"txt_hash": "8ff5babc2e2e7157a6ac1b05619b006d61f4c94627bc5bab58ed527a31220b79"
}
},
"status": "active"
}