Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 05.09.2012
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+
Maintenance updates Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (24.06.2013) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0829-2012

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, HMAC
Asymmetric Algorithms
RSA2048, RSA4096, RSA-2048, RSA 1024, ECDH, ECDSA, ECC
Hash functions
SHA-2
Randomness
TRNG, PRNG, RNG
Libraries
v1.02.013

Vendor
Infineon, Infineon Technologies AG, Infineon Technologies, G&D

Security level
EAL 5, EAL 4, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 5 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.3, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011
Evaluation facilities
TĂśV Informationstechnik
Certification process
A11 and M11, Version 3, 2012-08-28, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11 and M11, Version 3, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 and M11 including optional Software Libraries RSA –, – SHA-2 – Toolbox, Version 1.1, 2012-06-29, Infineon Technologies AG (confidential document) [11] M7801/M7820 Controller Security Guidelines, 2012-05-07, Infineon Technologies AG [12] SLx 70

Side-channel analysis
physical probing, SPA, DPA, physical tampering, DFA, JIL
Certification process
A11 and M11, Version 3, 2012-08-28, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11 and M11, Version 3, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 and M11 including optional Software Libraries RSA –, – SHA-2 – Toolbox, Version 1.1, 2012-06-29, Infineon Technologies AG (confidential document) [11] M7801/M7820 Controller Security Guidelines, 2012-05-07, Infineon Technologies AG [12] SLx 70

Standards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 36, AIS31, AIS 32, AIS 35, AIS 38, AIS47, ISO/IEC 18092
Technical reports
BSI TR-02102, BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0829-2012
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software, Infineon Technologies AG"
Author Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date D:20120912093345+02'00'
Modification date D:20120912093725+02'00'
Pages 46
Creator Writer
Producer LibreOffice 3.5

Frontpage

Certificate ID BSI-DSZ-CC-0829-2012
Certified item Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
Certification lab BSI
Developer Infineon Technologies AG

References

Outgoing
  • BSI-DSZ-CC-0728-2011 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
Incoming
  • ANSSI-CC-2014/49 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11 (Version du patch : 1.5)
  • ANSSI-CC-2013/34 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/62 - archived - Application eTravel EAC v2.0, en configurationSAC, sur la carte Ă  puce fermĂ©e MultiApp V3masquĂ©e sur le composant M7820 A11(Version du patch : 5.0)
  • ANSSI-CC-2014/50 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11 (Version du patch : 1.5)
  • ANSSI-CC-2014/61 - archived - Application eTravel EAC v2.0 sur la carte Ă  pucefermĂ©e MultiApp V3 masquĂ©e sur le composantM7820 A11(Version du patch : 5.0)
  • ANSSI-CC-2014/08 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2013/35 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2013/64 - archived - Carte Ă  puce SLJ 52 Gxx yyy AL : application pour passeport Ă©lectronique sur plateforme jTOP INFv#46 masquĂ©e sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM
  • CRP290 - archived - Sealys eTravel SCOSTA–CL on G265 - V3c
  • ANSSI-CC-2013/42 - archived - Plateforme jTOP INFv#46 masquĂ©e sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalitĂ©s MRTD
  • ANSSI-CC-2015/09 - archived - Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermĂ©e MultiApp V3masquĂ©e sur le composant M7820 A11(Version du patch : 1.5)
  • ANSSI-CC-2014/06 - archived - Plateforme Java Card en configuration ouverte de la carte Ă  puce MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/13 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • BSI-DSZ-CC-0898-2014 - archived - PWPW SmartApp-ID 3.1 (IFX)
  • ANSSI-CC-2013/55 - archived - Plateforme jTOP INFv#46 masquĂ©e sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM
  • ANSSI-CC-2013/33 - archived - Application eTravel EAC v2.0 sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/48 - archived - Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11 (Version du patch : 1.5)
  • ANSSI-CC-2013/32 - archived - Plateforme Java Card en configuration ouverte de la carte Ă  puce MultiApp V3 masquĂ©e sur le composant M7820 A11
  • BSI-DSZ-CC-0829-V2-2015 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
  • BSI-DSZ-CC-0904-2015 - archived - TCOS FlexCert 2.0 Release 1/SLE78CLX1440P
  • ANSSI-CC-2014/09 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/11 - archived - Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/12 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2015/25 - archived - Plateforme jTOP INFv#46P31 masquĂ©e sur les composants M7820 A11 et M11 avec fonctionnalitĂ©s MRTD, version 46.31
  • ANSSI-CC-2014/07 - archived - Application eTravel EAC v2.0 sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/14 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, HMAC
Asymmetric Algorithms
RSA2048, RSA4096, RSA-2048, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-256, SHA-512, SHA-2
Schemes
Key Agreement
Randomness
TRNG, PRNG, RND, RNG
Libraries
v1.02.013
Block cipher modes
ECB, CBC, CFB

Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
EAL5, EAL 5, EAL5 augmented, EAL 5 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_FSP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FMT_MSA.2, FMT_CKM.4, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2.1, FPT_AMT.1, FPT_LIM.2, FRU_FLT.2
Protection profiles
BSI-PP-0035
Certificates
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0695-2011, CC-0728-2011

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, SPA, DPA, Malfunction, malfunction, DFA, fault induction

Standards
FIPS PUB 197, FIPS PUB 180-4, PKCS#1, AIS31, AIS32, RFC3447, RFC 5639, ISO/IEC 14443, ISO/IEC18092, ISO/IEC 18092, ISO/IEC 7816-3, CCMB-2009-07-003, CCMB-2009-07-001, CCMB-2009-07-002
Technical reports
BSI 1

File metadata

Title CC EAL5+ Certification Security Target
Subject Security Target M7892 Integrity Guard
Keywords Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1
Author Hans-Ulrich BuchmĂĽller
Creation date D:20120828132014
Modification date D:20120828132014
Pages 85
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

References

Outgoing
  • BSI-DSZ-CC-0695-2011 - archived - Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
  • BSI-DSZ-CC-0813-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
Incoming
  • ANSSI-CC-2013/34 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/62 - archived - Application eTravel EAC v2.0, en configurationSAC, sur la carte Ă  puce fermĂ©e MultiApp V3masquĂ©e sur le composant M7820 A11(Version du patch : 5.0)
  • ANSSI-CC-2014/61 - archived - Application eTravel EAC v2.0 sur la carte Ă  pucefermĂ©e MultiApp V3 masquĂ©e sur le composantM7820 A11(Version du patch : 5.0)
  • ANSSI-CC-2016/74 - archived - eTravel SAC/EAC/BAC V2.0 with Filter 5.0 on MultiApp V3 - Configuration BAC rĂ©fĂ©rence T1033550
  • ANSSI-CC-2014/08 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2013/35 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2015/09 - archived - Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermĂ©e MultiApp V3masquĂ©e sur le composant M7820 A11(Version du patch : 1.5)
  • ANSSI-CC-2014/06 - archived - Plateforme Java Card en configuration ouverte de la carte Ă  puce MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/13 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • BSI-DSZ-CC-0898-2014 - archived - PWPW SmartApp-ID 3.1 (IFX)
  • ANSSI-CC-2013/33 - archived - Application eTravel EAC v2.0 sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/48 - archived - Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11 (Version du patch : 1.5)
  • ANSSI-CC-2013/32 - archived - Plateforme Java Card en configuration ouverte de la carte Ă  puce MultiApp V3 masquĂ©e sur le composant M7820 A11
  • BSI-DSZ-CC-0904-2015 - archived - TCOS FlexCert 2.0 Release 1/SLE78CLX1440P
  • ANSSI-CC-2016/75 - archived - eTravel SAC/EAC/BAC V2.0 with Filter 5.0 on MultiApp V3 - Configuration SAC rĂ©fĂ©rence T1033550
  • ANSSI-CC-2014/09 - archived - Application eTravel EAC v2.0, en configuration BAC, sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/11 - archived - Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/12 - archived - Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2014/07 - archived - Application eTravel EAC v2.0 sur la carte Ă  puce fermĂ©e MultiApp V3 masquĂ©e sur le composant M7820 A11
  • ANSSI-CC-2016/73 - archived - eTravel SAC/EAC/BAC V2.0 with Filter 5.0 on MultiApp V3 - Configuration EAC on SAC rĂ©fĂ©rence T1033550
  • ANSSI-CC-2014/14 - archived - Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquĂ©e sur le composant M7820 A11

Heuristics ?

Certificate ID: BSI-DSZ-CC-0829-2012

Extracted SARs

ASE_CCL.1, AGD_PRE.1, ATE_COV.2, ASE_REQ.2, APE_INT.1, ASE_TSS.1, ALC_FLR.3, ATE_IND.2, ASE_ECD.1, ALC_TAT.2, ASE_SPD.1, AVA_VAN.5, ALC_CMC.4, APE_ECD.1, ALC_DEL.1, APE_CCL.1, ALC_DVS.2, ADV_INT.2, ADV_SPM.1, ALC_LCD.1, ASE_INT.1, ATE_FUN.1, APE_SPD.1, ASE_OBJ.2, ADV_IMP.1, APE_OBJ.2, ADV_FSP.5, ATE_DPT.3, ALC_CMS.5, APE_REQ.2, ADV_TDS.4, ADV_ARC.1, AGD_OPE.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2017-15361
C M N
MEDIUM 5.9 3.6 16.10.2017 17:29

References ?

Updates ?

  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "6de5e7a68582ea80",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0829-2012",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02.013",
        "1.01"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2014/07",
          "ANSSI-CC-2014/14",
          "ANSSI-CC-2013/34",
          "ANSSI-CC-2014/06",
          "ANSSI-CC-2013/33",
          "ANSSI-CC-2015/25",
          "ANSSI-CC-2014/48",
          "CRP290",
          "ANSSI-CC-2013/55",
          "ANSSI-CC-2014/09",
          "ANSSI-CC-2013/64",
          "BSI-DSZ-CC-0904-2015",
          "ANSSI-CC-2014/50",
          "ANSSI-CC-2014/12",
          "ANSSI-CC-2014/49",
          "ANSSI-CC-2015/09",
          "ANSSI-CC-2013/42",
          "ANSSI-CC-2014/08",
          "BSI-DSZ-CC-0898-2014",
          "ANSSI-CC-2014/62",
          "ANSSI-CC-2014/11",
          "ANSSI-CC-2014/61",
          "ANSSI-CC-2014/13",
          "ANSSI-CC-2013/35",
          "ANSSI-CC-2013/32",
          "BSI-DSZ-CC-0829-V2-2015"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0728-2011"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2014/07",
          "BSI-DSZ-CC-0835-V2-2017",
          "ANSSI-CC-2014/14",
          "ANSSI-CC-2013/34",
          "ANSSI-CC-2015/37",
          "ANSSI-CC-2014/06",
          "ANSSI-CC-2015/15",
          "ANSSI-CC-2016/04",
          "ANSSI-CC-2016/73",
          "ANSSI-CC-2013/33",
          "ANSSI-CC-2015/25",
          "ANSSI-CC-2015/39",
          "ANSSI-CC-2014/48",
          "CRP290",
          "ANSSI-CC-2015/41",
          "BSI-DSZ-CC-0836-V2-2017",
          "ANSSI-CC-2013/55",
          "ANSSI-CC-2014/09",
          "ANSSI-CC-2015/38",
          "ANSSI-CC-2015/02",
          "ANSSI-CC-2013/64",
          "BSI-DSZ-CC-0904-2015",
          "ANSSI-CC-2014/86",
          "ANSSI-CC-2014/50",
          "ANSSI-CC-2014/12",
          "ANSSI-CC-2014/49",
          "ANSSI-CC-2015/01",
          "ANSSI-CC-2015/09",
          "ANSSI-CC-2013/42",
          "ANSSI-CC-2014/08",
          "BSI-DSZ-CC-0898-2014",
          "ANSSI-CC-2014/62",
          "BSI-DSZ-CC-0952-V2-2016",
          "ANSSI-CC-2016/03",
          "ANSSI-CC-2016/74",
          "ANSSI-CC-2014/11",
          "ANSSI-CC-2015/30",
          "ANSSI-CC-2015/40",
          "ANSSI-CC-2015/03",
          "ANSSI-CC-2015/08",
          "BSI-DSZ-CC-0904-V2-2021",
          "ANSSI-CC-2014/61",
          "ANSSI-CC-2014/13",
          "ANSSI-CC-2013/35",
          "ANSSI-CC-2016/75",
          "ANSSI-CC-2015/04",
          "BSI-DSZ-CC-0941-2016",
          "ANSSI-CC-2013/32",
          "BSI-DSZ-CC-0829-V2-2015"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010",
          "BSI-DSZ-CC-0728-2011"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2014/07",
          "ANSSI-CC-2014/14",
          "ANSSI-CC-2013/34",
          "ANSSI-CC-2014/06",
          "ANSSI-CC-2016/73",
          "ANSSI-CC-2013/33",
          "ANSSI-CC-2014/48",
          "ANSSI-CC-2014/09",
          "BSI-DSZ-CC-0904-2015",
          "ANSSI-CC-2014/12",
          "ANSSI-CC-2015/09",
          "ANSSI-CC-2014/08",
          "BSI-DSZ-CC-0898-2014",
          "ANSSI-CC-2014/62",
          "ANSSI-CC-2016/74",
          "ANSSI-CC-2014/11",
          "ANSSI-CC-2014/61",
          "ANSSI-CC-2013/35",
          "ANSSI-CC-2016/75",
          "ANSSI-CC-2014/13",
          "ANSSI-CC-2013/32"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0813-2012",
          "BSI-DSZ-CC-0695-2011"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2014/07",
          "ANSSI-CC-2014/14",
          "ANSSI-CC-2013/34",
          "ANSSI-CC-2014/06",
          "ANSSI-CC-2016/73",
          "ANSSI-CC-2013/33",
          "ANSSI-CC-2014/48",
          "ANSSI-CC-2014/09",
          "BSI-DSZ-CC-0904-2015",
          "ANSSI-CC-2014/12",
          "ANSSI-CC-2015/09",
          "ANSSI-CC-2014/08",
          "BSI-DSZ-CC-0898-2014",
          "ANSSI-CC-2014/62",
          "ANSSI-CC-2016/74",
          "ANSSI-CC-2014/11",
          "ANSSI-CC-2014/61",
          "ANSSI-CC-2013/35",
          "ANSSI-CC-2016/75",
          "ANSSI-CC-2014/13",
          "ANSSI-CC-2013/32"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010",
          "BSI-DSZ-CC-0728-2011",
          "BSI-DSZ-CC-0813-2012",
          "BSI-DSZ-CC-0695-2011"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2013-06-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829_ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software"
      }
    ]
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-09-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0829a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0829-2012",
        "cert_item": "Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-2048": 1,
          "RSA2048": 2,
          "RSA4096": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0728-2011": 3,
          "BSI-DSZ-CC-0829-2012": 24
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 5": 6,
          "EAL 5 augmented": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 8,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "A11 and M11, Version 3, 2012-08-28, T\u00dcV Informationstechnik GmbH \u2013 Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11 and M11, Version 3": 1,
          "T\u00dcV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 and M11 including optional Software Libraries RSA \u2013": 1,
          "\u2013 SHA-2 \u2013 Toolbox, Version 1.1, 2012-06-29, Infineon Technologies AG (confidential document) [11] M7801/M7820 Controller Security Guidelines, 2012-05-07, Infineon Technologies AG [12] SLx 70": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 33
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 24
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 5,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 6,
          "SPA": 5,
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 1,
          "AIS 36": 3,
          "AIS 38": 1,
          "AIS31": 1,
          "AIS47": 1
        },
        "ISO": {
          "ISO/IEC 18092": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1
        },
        "Infineon": {
          "Infineon": 14,
          "Infineon Technologies": 8,
          "Infineon Technologies AG": 18
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20120912093345+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software, Infineon Technologies AG\"",
      "/ModDate": "D:20120912093725+02\u002700\u0027",
      "/Producer": "LibreOffice 3.5",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0829-2012",
      "pdf_file_size_bytes": 1362115,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    },
    "st_filename": "0829b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 16
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 5
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-2048": 1,
          "RSA2048": 1,
          "RSA4096": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0695-2011": 1,
          "BSI-DSZ-CC-0813-2012": 1
        },
        "NL": {
          "CC-0728-2011": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 3,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 1,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 3,
          "EAL 5 augmented": 3,
          "EAL5": 5,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 34,
          "FCS_CKM.2": 5,
          "FCS_CKM.4": 24,
          "FCS_COP": 58,
          "FCS_COP.1": 28,
          "FCS_RNG": 13,
          "FCS_RNG.1": 29,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 25,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 22,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 15,
          "FDP_ITC.1": 18,
          "FDP_ITC.2": 18,
          "FDP_ITT.1": 18,
          "FDP_SDI.1": 17,
          "FDP_SDI.1.1": 1,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2
        },
        "FIA": {
          "FIA_SOS.2": 3,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 2
        },
        "FMT": {
          "FMT_CKM.4": 1,
          "FMT_LIM": 3,
          "FMT_LIM.1": 7,
          "FMT_LIM.2": 7,
          "FMT_MSA.1": 20,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 21,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 19,
          "FPT_ITT.1": 16,
          "FPT_LIM.2": 1,
          "FPT_PHP.3": 25,
          "FPT_TST": 7,
          "FPT_TST.1": 11,
          "FPT_TST.2": 36,
          "FPT_TST.2.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CFB": {
          "CFB": 5
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 12
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 61,
            "SHA-256": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 7
        },
        "RNG": {
          "RND": 2,
          "RNG": 9
        },
        "TRNG": {
          "TRNG": 14
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 7,
          "Malfunction": 12,
          "fault induction": 1,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 10,
          "Leak-Inherent": 10,
          "Physical Probing": 2,
          "SPA": 5,
          "physical probing": 1,
          "side channel": 8
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 10,
          "AIS32": 5
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 2
        },
        "FIPS": {
          "FIPS PUB 180-4": 2,
          "FIPS PUB 197": 2
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 18092": 6,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC18092": 6
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC3447": 11
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24
          }
        },
        "DES": {
          "3DES": {
            "3DES": 17,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 9,
          "Infineon Technologies": 7,
          "Infineon Technologies AG": 16
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Hans-Ulrich Buchm\u00fcller",
      "/CreationDate": "D:20120828132014",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1",
      "/ModDate": "D:20120828132014",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Security Target M7892 Integrity Guard",
      "/Title": "CC EAL5+ Certification Security Target",
      "pdf_file_size_bytes": 889908,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 85
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0829a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0829b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c612a4e4a03364a599c924a20703c107b54e32289b1057453bbdfd51958a3c0e",
      "txt_hash": "2223602b87bfe5c7d8bc107cfa67b79061df9eeda58c1f23157114c411d3ce4d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5640d1648931967eae59f8fdfec115c14673e5c9ffc9cdca7689932a1efb4a75",
      "txt_hash": "cdf3132511bdb9afcb540dc038bb07430cd4f185de2045a7dfcf431da3f10637"
    }
  },
  "status": "archived"
}