This page was not yet optimized for use on mobile
devices.
Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
CSV information
| Status | archived |
|---|---|
| Valid from | 21.06.2006 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, AVA_MSU.3, EAL5+, AVA_VLA.4 |
| Maintenance updates | Infineon Smart Card IC (Security Controller)SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834 b17, SLE88CFX3520P/m8847b17,SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17, each with (10.09.2007) Certification report |
| Infineon Smart Card IC (Security Controller) SLE88CFX4000P/M8830-b17, SLE88CFX4002P/M8834-b17, SLE88CFX3520P/M8847-b17, SLE88CFX2920P/M8849-b17, SLE88CF4000P/M8845-b17, SLE88CF4002P/M8846-b17, SLE88CF3520P/M8848-b17, SLE88CF2920P/M8850-b17 each with specific IC Dedicated Software (19.05.2009) Certification report | |
| Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 (28.02.2007) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0376-2006
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DESHash functions
SHA-1Randomness
RNGVendor
Infineon, Infineon Technologies AG, Infineon Technologies, PhilipsSecurity level
EAL4, EAL5, EAL 1, EAL 7, EAL 4, EAL 5, EAL5+, EAL1, EAL3, EAL7, EAL2, EAL6, EAL5 augmented, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT.1, ACM_CAP.4, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_TST.2, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0269-2006, BSI-DSZ-CC-0376, CC-0269-2006Evaluation facilities
TÜV InformationstechnikSide-channel analysis
Physical Probing, physical probing, DPA, physical tampering, malfunction, MalfunctionCertification process
Product Infineon Smart Card IC SLE88CFX4000P/m8830, Version 1.32, Date 13.06.06, T- Systems (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID, Management Scope (ACM_SCP), Version 1.3, Date 15.05.2006 (i.e. TOE Configuration List, confidential document) [10] ETR-lite for composition according to AIS 36 for the Product Infineon Smart Card IC, Version 1.30, T-Systems GEI GmbH, 16.05.2006 (confidential document) [11] SLE88CFXxxxxP PSL & Security Reference Manual, Edition 2006-03, Infineon Technologies AG, 2006, (confidential document) [12] SLE88CFXxxxxP Preliminary Hardware Reference Manual, Edition 2005- 03, Infineon Technologies, March 2005, (confidential document) [13] SLE88 Family Application Design Reference Manual, Edition Dec. 2005, Infineon Technologies AG, December 2005, (confidential document) [14] SLE 88 Family – Delta Manual for SDK 2.9 SP4, Edition 2006-01, Infineon Technologies AG, 2006, (confidential document) [15] SLE88CFXxxxxP Errata Sheet, Edition May 04, 2006, Infineon Technologies AG, 04.05.2006Standards
AIS 34, AIS 32, AIS38, AIS 31, AIS 36, AIS 25, AIS 26, AIS31, AIS36, AIS 38, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0376-2006 |
|---|---|
| Keywords | CC, Common Criteria, Smartcard, Zertifizierung, Certification |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20060622153124+02'00' |
| Modification date | D:20060622153636+02'00' |
| Pages | 50 |
| Creator | Acrobat PDFMaker 7.0.7 für Word |
| Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
| Certificate ID | BSI-DSZ-CC-0376-2006 |
|---|---|
| Certified item | Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17 SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17 SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software |
| Certification lab | BSI |
| Developer | Infineon Technologies AG Certification Report V1.0 ZS-01-01-F-330 V3.28 |
References
Outgoing- BSI-DSZ-CC-0269-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17 and SLE88CFX2920P/m8849b17 each with PSL V0.50.23 and specific IC Dedicated Software
- ANSSI-CC-2008/37 - archived - LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
- BSI-DSZ-CC-0395-2007 - archived - Infineon Smart Card IC (Security controller) SLE88CFX4001P/m8835b18, SLE88CFX4003P/m8837b18, SLE88CFX3521P/m8857b18, SLE88CFX2921P/m8859b18, each with PSL V2.00.07 and specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DESHash functions
SHA-1Randomness
RNG, RNDVendor
Infineon Technologies AG, InfineonSecurity level
EAL5, EAL 5, EAL5 augmented, EAL 5 augmentedClaims
O.RND, O.ADD-, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_FSP.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_SOFSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_RND.1, FCS_RND.1.1, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ITC.1, FDP_ITT.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_LIM.1, FMT_LIM.2, FPT_TST.2, FPT_TST.1, FPT_TST.2.1, FPT_AMT.1, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_LIM.2, FPT_TST, FRU_FLT.2Protection profiles
BSI-PP-0002Side-channel analysis
Leak-Inherent, Physical Probing, DPA, SPA, Malfunction, malfunction, DFA, reverse engineeringStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 180-1, AIS31, ISO/IEC 7816-3File metadata
| Title | Security Target |
|---|---|
| Author | Jürgen Noller |
| Creation date | D:20060426092942+02'00' |
| Modification date | D:20060426095845+02'00' |
| Pages | 53 |
| Creator | Acrobat PDFMaker 6.0 for Word |
| Producer | Acrobat Distiller 6.0.1 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0376-2006Extracted SARs
ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Showing 5 out of 71.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8aec7cfe97ab46bc",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0376-2006",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0.50.23"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0395-2007",
"ANSSI-CC-2008/37"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1015-V2-2020",
"BSI-DSZ-CC-1158-V4-2025",
"BSI-DSZ-CC-1158-V3-2025",
"BSI-DSZ-CC-1069-2018",
"BSI-DSZ-CC-0936-2015",
"ANSSI-CC-2008/37",
"BSI-DSZ-CC-0395-2007",
"BSI-DSZ-CC-1015-2017",
"BSI-DSZ-CC-1158-2020",
"BSI-DSZ-CC-1158-V2-2023",
"BSI-DSZ-CC-0632-2011",
"BSI-DSZ-CC-0878-2013"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2007-02-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma1.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-05-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma3.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE88CFX4000P/M8830-b17, SLE88CFX4002P/M8834-b17, SLE88CFX3520P/M8847-b17, SLE88CFX2920P/M8849-b17, SLE88CF4000P/M8845-b17, SLE88CF4002P/M8846-b17, SLE88CF3520P/M8848-b17, SLE88CF2920P/M8850-b17 each with specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2007-09-10",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma2.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller)SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834 b17, SLE88CFX3520P/m8847b17,SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17, each with"
}
]
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2006-06-21",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0376a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0376-2006",
"cert_item": "Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17 SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17 SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG Certification Report V1.0 ZS-01-01-F-330 V3.28",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0269-2006": 1,
"BSI-DSZ-CC-0376": 3,
"BSI-DSZ-CC-0376-2006": 23
},
"NL": {
"CC-0269-2006": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.3": 3
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.3": 2,
"ADV_HLD": 2,
"ADV_HLD.3": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 2,
"ADV_INT": 2,
"ADV_INT.1": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.2": 2,
"ADV_SPM": 2,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 3,
"ALC_TAT": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 2,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 10,
"EAL5": 9,
"EAL5 augmented": 2,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_COP.1": 5,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_SEP.1": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"2006, (confidential document) [12] SLE88CFXxxxxP Preliminary Hardware Reference Manual, Edition 2005- 03, Infineon Technologies": 1,
"2006, (confidential document) [15] SLE88CFXxxxxP Errata Sheet, Edition May 04, 2006, Infineon Technologies AG, 04.05.2006": 1,
"December 2005, (confidential document) [14] SLE 88 Family \u2013 Delta Manual for SDK 2.9 SP4, Edition 2006-01, Infineon Technologies AG": 1,
"Management Scope (ACM_SCP), Version 1.3, Date 15.05.2006 (i.e. TOE Configuration List, confidential document) [10] ETR-lite for composition according to AIS 36 for the Product Infineon Smart Card IC": 1,
"March 2005, (confidential document) [13] SLE88 Family Application Design Reference Manual, Edition Dec. 2005, Infineon Technologies AG": 1,
"Product Infineon Smart Card IC SLE88CFX4000P/m8830, Version 1.32, Date 13.06.06, T- Systems (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID": 1,
"Version 1.30, T-Systems GEI GmbH, 16.05.2006 (confidential document) [11] SLE88CFXxxxxP PSL \u0026 Security Reference Manual, Edition 2006-03, Infineon Technologies AG": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 10
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Physical Probing": 1,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 3,
"AIS 32": 2,
"AIS 34": 3,
"AIS 36": 5,
"AIS 38": 1,
"AIS31": 1,
"AIS36": 1,
"AIS38": 5
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 4
},
"DES": {
"DES": 11
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 23,
"Infineon Technologies": 2,
"Infineon Technologies AG": 20
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Category": "Common Criteria Zertfizierung Certification",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20060622153124+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
"/Keywords": "CC, Common Criteria, Smartcard, Zertifizierung, Certification",
"/ModDate": "D:20060622153636+02\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20060622133104",
"/Title": "Certification Report BSI-DSZ-CC-0376-2006",
"pdf_file_size_bytes": 334503,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 50
},
"st_filename": "0376b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.ADD-": 1,
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 2
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.2": 1,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 3,
"ADV_HLD.3": 4,
"ADV_IMP.2": 3,
"ADV_INT.1": 2,
"ADV_LLD.1": 3,
"ADV_RCR.2": 1,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_LCD.2": 2,
"ALC_TAT.2": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 2
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU.3": 4,
"AVA_SOF": 5,
"AVA_SOF.1": 1,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 4,
"EAL5": 4,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM.1": 9,
"FCS_CKM.4": 9,
"FCS_COP.1": 25,
"FCS_COP.1.1": 5,
"FCS_RND": 2,
"FCS_RND.1": 4,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 13,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 5,
"FDP_ITC.1": 7,
"FDP_ITT.1": 3
},
"FMT": {
"FMT_LIM.1": 4,
"FMT_LIM.2": 4,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 9,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_AMT.1": 4,
"FPT_FLS.1": 8,
"FPT_ITT.1": 3,
"FPT_LIM.2": 1,
"FPT_PHP.3": 7,
"FPT_SEP.1": 4,
"FPT_TST": 2,
"FPT_TST.1": 8,
"FPT_TST.2": 21,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 8
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 11
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 11
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 8,
"malfunction": 1
},
"SCA": {
"DPA": 4,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 1
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 5
},
"FIPS": {
"FIPS PUB 180-1": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 7816-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 1
},
"DES": {
"DES": 18
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 4,
"Infineon Technologies AG": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "J\u00fcrgen Noller",
"/Baustein": "SLE88CFX4000P",
"/BausteinVersion": "b17",
"/Classification": "Public",
"/Company": "Infineon Technologies AG",
"/CreationDate": "D:20060426092942+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/Datum": "25-04-2006",
"/Dokument": "Security Target",
"/EEPROM": "400 kBytes",
"/Jahr": "2006",
"/ModDate": "D:20060426095845+02\u002700\u0027",
"/PP_Augmentations": "Smartcard Integrated Circuit Platform Augmentations V0.98",
"/PP_Date": "July 2001",
"/PP_Short": "BSI-PP-0002; Version 1.0, July 2001",
"/PP_Version": "1.0",
"/Producer": "Acrobat Distiller 6.0.1 (Windows)",
"/Protection Profile": "[BSI_PP]",
"/ROM": "80 kBytes",
"/SourceModified": "D:20060426072828",
"/Technologie": "0,13 \u00b5m",
"/Title": "Security Target",
"/Version": "1.3",
"/XRAM": "16 kBytes",
"/_AdHocReviewCycleID": "-1249368381",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "Noller Juergen (SMS SEC PS)",
"/_EmailSubject": "ST 88ziger",
"/m-Nummer": "m8830",
"pdf_file_size_bytes": 473772,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:CRYPTO@1408Bit",
"mailto:Crypto@1408BIT"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 53
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VLA.4",
"ALC_DVS.2",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "544dca7c252b3c604a4cdcf412ef53f6c56152decb5d07e7046bc3ecf7bd15c2",
"txt_hash": "2fe984f607afafb2ca4ad38b0ba1e6d958cd37ede99f8b8c1ee9f78c8eab9b15"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "426935025048bf6da8f13a025f04bcc19136e832c8f47725ac4d8fd483cc2bbe",
"txt_hash": "a6e8b4ecc11ef0596be7cb19be136c530669605b89d08eb405f72cf4a3e37009"
}
},
"status": "archived"
}