This page was not yet optimized for use on mobile
devices.
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
CSV information
| Status | archived |
|---|---|
| Valid from | 06.06.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, AVA_VAN.5, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0813-2012
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, HMACAsymmetric Algorithms
RSA2048, RSA4096, RSA-2048, RSA 1024, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-2Randomness
TRNG, PRNG, RNGVendor
Infineon, Infineon Technologies AG, Infineon Technologies, G&DSecurity level
EAL 5, EAL 4, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 5 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.3, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-S-0007-Evaluation facilities
TÜV InformationstechnikSide-channel analysis
DPA, SPA, physical tampering, DFA, JILCertification process
M7820 A11, Version 1, 2012-06-01, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –, – Toolbox, Version 2.0, 2012-05-03, Infineon Technologies AG (confidential document) [11] SLE70 Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface, Version 1.02.008Standards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 36, AIS31, AIS 20, AIS 32, AIS 38, AIS47, ISO/IEC 18092Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0813-2012 |
|---|---|
| Subject | Common Criteria Zertifizierung |
| Keywords | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20120620074213+02'00' |
| Modification date | D:20120622114739+02'00' |
| Pages | 46 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0813-2012 |
|---|---|
| Certified item | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0728-2011 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
- BSI-DSZ-CC-0835-2013 - archived - TCOS Residence Permit Card Version 1.1 Release 1/ SLE78CLX1440P
- BSI-DSZ-CC-0819-2012 - archived - STARCOS 3.5 ID SAC+EAC+AA C1
- BSI-DSZ-CC-0836-2013 - archived - TCOS Residence Permit Card Version 1.1 Release 1-BAC/ SLE78CLX1440P
- ANSSI-CC-2012/44 - archived - Plateforme ID Motion V1 avec AMD 122v1 sur composants M7820 A11
- ANSSI-CC-2012/85 - archived - Plateforme ID Motion V1 avec AMD 122v1 sur composants M7801 A12
- BSI-DSZ-CC-0760-2013 - archived - STARCOS 3.5 ID EAC+AA C1
- ANSSI-CC-2012/50 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11
- ANSSI-CC-2012/51 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 122v1, masquée sur composants M7820 A11
- BSI-DSZ-CC-0751-2013 - archived - STARCOS 3.5 ID GCC C2
- ANSSI-CC-2012/32 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0764-2012 - archived - tru/cos tacho v1.0
- ANSSI-CC-2012/31 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0922-2014 - archived - STARCOS 3.5 ID SAC+EAC+AA C1R
- ANSSI-CC-2012/38 - archived - Plateforme ID Motion V1 avec AMD 113v3 sur composants M7820 A11
- BSI-DSZ-CC-0818-2013 - archived - TCOS Identity Card Version 1.0 Release 2/SLE78CLX1440P
- BSI-DSZ-CC-0952-2014 - archived - STARCOS 3.5 ID GCC C2R
- ANSSI-CC-2012/41 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0851-2013 - archived - MTCOS Pro 2.2 EAC with PACE / (SLE78CLX) M7820 (BAC)
- BSI-DSZ-CC-0761-2013 - archived - STARCOS 3.5 ID BAC C1
- BSI-DSZ-CC-0769-2012 - archived - STARCOS 3.5 ID ECC C1
- BSI-DSZ-CC-0941-2016 - archived - MTCOS Pro 2.2 EAC with PACE / SLE78CLX M7820 V2
- ANSSI-CC-2012/40 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0850-2013 - archived - MTCOS Pro 2.2 EAC with PACE / (SLE78CLX) M7820
- BSI-DSZ-CC-0880-2013 - archived - STARCOS 3.5 ID ECC C1R
- ANSSI-CC-2013/39 - archived - Plateforme Multos M3 avec AMD 113v4 masquée sur composant SLE78CLX1600PM
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, HMACAsymmetric Algorithms
RSA2048, RSA4096, RSA-2048, RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-256, SHA-512, SHA-2Schemes
Key AgreementRandomness
TRNG, PRNG, RND, RNGVendor
Infineon Technologies AG, Infineon, Infineon TechnologiesSecurity level
EAL5, EAL 5, EAL5 augmented, EAL 5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_FSP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FMT_MSA.2, FMT_CKM.4, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2.1, FPT_AMT.1, FPT_LIM.2, FRU_FLT.2Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0728-2011Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, SPA, DPA, Malfunction, malfunction, DFA, fault inductionStandards
FIPS PUB 197, FIPS PUB 180-4, PKCS#1, AIS32, AIS31, RFC3447, RFC 5639, ISO/IEC 14443, ISO/IEC18092, ISO/IEC 18092, ISO/IEC 7816-3, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-001Technical reports
BSI TR-02102File metadata
| Title | Security Target |
|---|---|
| Author | Hans-Ulrich Buchmüller; modified by Steffen Heinkel |
| Creation date | D:20120516160724+02'00' |
| Modification date | D:20120622123754+02'00' |
| Pages | 81 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
References
Outgoing- BSI-DSZ-CC-0728-2011 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
- BSI-DSZ-CC-0835-2013 - archived - TCOS Residence Permit Card Version 1.1 Release 1/ SLE78CLX1440P
- BSI-DSZ-CC-0819-2012 - archived - STARCOS 3.5 ID SAC+EAC+AA C1
- BSI-DSZ-CC-0836-2013 - archived - TCOS Residence Permit Card Version 1.1 Release 1-BAC/ SLE78CLX1440P
- ANSSI-CC-2012/44 - archived - Plateforme ID Motion V1 avec AMD 122v1 sur composants M7820 A11
- BSI-DSZ-CC-0760-2013 - archived - STARCOS 3.5 ID EAC+AA C1
- ANSSI-CC-2012/50 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 122v1, masquée sur composants M7820 A11
- ANSSI-CC-2012/51 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 122v1, masquée sur composants M7820 A11
- BSI-DSZ-CC-0829-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
- BSI-DSZ-CC-0751-2013 - archived - STARCOS 3.5 ID GCC C2
- ANSSI-CC-2012/32 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- ANSSI-CC-2012/31 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0922-2014 - archived - STARCOS 3.5 ID SAC+EAC+AA C1R
- ANSSI-CC-2012/38 - archived - Plateforme ID Motion V1 avec AMD 113v3 sur composants M7820 A11
- BSI-DSZ-CC-0818-2013 - archived - TCOS Identity Card Version 1.0 Release 2/SLE78CLX1440P
- BSI-DSZ-CC-0952-2014 - archived - STARCOS 3.5 ID GCC C2R
- ANSSI-CC-2012/41 - archived - Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- ANSSI-CC-2013/10 - archived - Virtual Machine of ID Motion V1 G230 mask with AMD 122v1
- BSI-DSZ-CC-0761-2013 - archived - STARCOS 3.5 ID BAC C1
- BSI-DSZ-CC-0769-2012 - archived - STARCOS 3.5 ID ECC C1
- ANSSI-CC-2012/40 - archived - Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- BSI-DSZ-CC-0829-V2-2015 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
- ANSSI-CC-2013/40 - archived - Virtual Machine of Multos M3 G230M mask with AMD 113v4
- BSI-DSZ-CC-0880-2013 - archived - STARCOS 3.5 ID ECC C1R
- ANSSI-CC-2013/39 - archived - Plateforme Multos M3 avec AMD 113v4 masquée sur composant SLE78CLX1600PM
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0813-2012Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 201.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "2d236a32ede04769",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0813-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.02.008",
"1.01"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0751-2013",
"BSI-DSZ-CC-0941-2016",
"BSI-DSZ-CC-0952-2014",
"BSI-DSZ-CC-0922-2014",
"BSI-DSZ-CC-0764-2012",
"ANSSI-CC-2012/40",
"ANSSI-CC-2012/51",
"ANSSI-CC-2012/32",
"BSI-DSZ-CC-0850-2013",
"ANSSI-CC-2012/38",
"ANSSI-CC-2012/44",
"ANSSI-CC-2012/85",
"ANSSI-CC-2013/39",
"BSI-DSZ-CC-0819-2012",
"BSI-DSZ-CC-0769-2012",
"ANSSI-CC-2012/31",
"BSI-DSZ-CC-0760-2013",
"BSI-DSZ-CC-0835-2013",
"BSI-DSZ-CC-0836-2013",
"BSI-DSZ-CC-0761-2013",
"ANSSI-CC-2012/41",
"BSI-DSZ-CC-0818-2013",
"BSI-DSZ-CC-0851-2013",
"BSI-DSZ-CC-0880-2013",
"ANSSI-CC-2012/50"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0728-2011"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0751-2013",
"BSI-DSZ-CC-0941-2016",
"BSI-DSZ-CC-0952-2014",
"BSI-DSZ-CC-0836-V2-2017",
"BSI-DSZ-CC-0922-2014",
"BSI-DSZ-CC-0764-2012",
"ANSSI-CC-2013/11",
"ANSSI-CC-2012/40",
"ANSSI-CC-2012/51",
"ANSSI-CC-2012/32",
"BSI-DSZ-CC-0850-2013",
"ANSSI-CC-2012/38",
"ANSSI-CC-2012/44",
"ANSSI-CC-2012/85",
"ANSSI-CC-2013/39",
"BSI-DSZ-CC-0835-V2-2017",
"BSI-DSZ-CC-0819-2012",
"BSI-DSZ-CC-0769-2012",
"ANSSI-CC-2012/31",
"BSI-DSZ-CC-0760-2013",
"BSI-DSZ-CC-0835-2013",
"ANSSI-CC-2013/10",
"BSI-DSZ-CC-0761-2013",
"BSI-DSZ-CC-0836-2013",
"ANSSI-CC-2012/41",
"BSI-DSZ-CC-0818-2013",
"BSI-DSZ-CC-0889-2013",
"ANSSI-CC-2013/40",
"BSI-DSZ-CC-0851-2013",
"BSI-DSZ-CC-0880-2013",
"BSI-DSZ-CC-0952-V2-2016",
"ANSSI-CC-2012/50"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0640-2010",
"BSI-DSZ-CC-0728-2011"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0829-V2-2015",
"BSI-DSZ-CC-0751-2013",
"BSI-DSZ-CC-0952-2014",
"BSI-DSZ-CC-0922-2014",
"BSI-DSZ-CC-0829-2012",
"ANSSI-CC-2012/40",
"ANSSI-CC-2012/51",
"ANSSI-CC-2012/32",
"ANSSI-CC-2012/38",
"ANSSI-CC-2012/44",
"ANSSI-CC-2013/39",
"BSI-DSZ-CC-0819-2012",
"BSI-DSZ-CC-0769-2012",
"ANSSI-CC-2012/31",
"BSI-DSZ-CC-0760-2013",
"BSI-DSZ-CC-0835-2013",
"ANSSI-CC-2013/10",
"BSI-DSZ-CC-0761-2013",
"BSI-DSZ-CC-0836-2013",
"ANSSI-CC-2012/41",
"BSI-DSZ-CC-0818-2013",
"ANSSI-CC-2013/40",
"BSI-DSZ-CC-0880-2013",
"ANSSI-CC-2012/50"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0728-2011"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/61",
"BSI-DSZ-CC-0829-V2-2015",
"BSI-DSZ-CC-0751-2013",
"ANSSI-CC-2014/48",
"BSI-DSZ-CC-0952-2014",
"ANSSI-CC-2014/09",
"BSI-DSZ-CC-0922-2014",
"ANSSI-CC-2014/12",
"BSI-DSZ-CC-0829-2012",
"ANSSI-CC-2012/40",
"ANSSI-CC-2012/51",
"ANSSI-CC-2012/32",
"ANSSI-CC-2012/38",
"ANSSI-CC-2012/44",
"ANSSI-CC-2016/75",
"ANSSI-CC-2013/39",
"BSI-DSZ-CC-0904-2015",
"ANSSI-CC-2013/35",
"BSI-DSZ-CC-0819-2012",
"ANSSI-CC-2013/32",
"BSI-DSZ-CC-0769-2012",
"ANSSI-CC-2012/31",
"ANSSI-CC-2014/13",
"BSI-DSZ-CC-0760-2013",
"ANSSI-CC-2016/74",
"ANSSI-CC-2015/09",
"ANSSI-CC-2014/11",
"BSI-DSZ-CC-0835-2013",
"BSI-DSZ-CC-0898-2014",
"ANSSI-CC-2013/33",
"ANSSI-CC-2013/10",
"ANSSI-CC-2014/06",
"ANSSI-CC-2014/62",
"BSI-DSZ-CC-0836-2013",
"BSI-DSZ-CC-0761-2013",
"ANSSI-CC-2012/41",
"ANSSI-CC-2014/07",
"ANSSI-CC-2016/73",
"BSI-DSZ-CC-0818-2013",
"ANSSI-CC-2013/34",
"ANSSI-CC-2013/40",
"ANSSI-CC-2014/08",
"BSI-DSZ-CC-0880-2013",
"ANSSI-CC-2014/14",
"ANSSI-CC-2012/50"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0640-2010",
"BSI-DSZ-CC-0728-2011"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-06-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0813a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0813-2012",
"cert_item": "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 1024": 1,
"RSA-2048": 1,
"RSA2048": 4,
"RSA4096": 4
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0728-2011": 3,
"BSI-DSZ-CC-0813-2012": 24,
"BSI-DSZ-CC-S-0007-": 1
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 5": 6,
"EAL 5 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 8,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"M7820 A11, Version 1, 2012-06-01, T\u00dcV Informationstechnik GmbH \u2013 Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1": 1,
"T\u00dcV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA \u2013 EC \u2013": 1,
"\u2013 Toolbox, Version 2.0, 2012-05-03, Infineon Technologies AG (confidential document) [11] SLE70 Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface, Version 1.02.008": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 28
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 4,
"SPA": 3
},
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 36": 3,
"AIS 38": 1,
"AIS31": 1,
"AIS47": 1
},
"ISO": {
"ISO/IEC 18092": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"3DES": 3,
"Triple-DES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1
},
"Infineon": {
"Infineon": 12,
"Infineon Technologies": 7,
"Infineon Technologies AG": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20120620074213+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG\"",
"/ModDate": "D:20120622114739+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-0813-2012",
"pdf_file_size_bytes": 1310180,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
},
"st_filename": "0813b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"Diffie-Hellman": 5
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 1,
"RSA-2048": 1,
"RSA2048": 1,
"RSA4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0728-2011": 1
}
},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 3,
"EAL 5 augmented": 3,
"EAL5": 5,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 4,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 34,
"FCS_CKM.2": 5,
"FCS_CKM.4": 24,
"FCS_COP": 58,
"FCS_COP.1": 28,
"FCS_RNG": 12,
"FCS_RNG.1": 30,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 25,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 22,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 15,
"FDP_ITC.1": 18,
"FDP_ITC.2": 18,
"FDP_ITT.1": 18,
"FDP_SDI.1": 17,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 15,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2
},
"FIA": {
"FIA_SOS.2": 3,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 2
},
"FMT": {
"FMT_CKM.4": 1,
"FMT_LIM": 3,
"FMT_LIM.1": 7,
"FMT_LIM.2": 7,
"FMT_MSA.1": 20,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 21,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 19,
"FPT_ITT.1": 16,
"FPT_LIM.2": 1,
"FPT_PHP.3": 25,
"FPT_TST": 7,
"FPT_TST.1": 11,
"FPT_TST.2": 36,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 61,
"SHA-256": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 6
},
"RNG": {
"RND": 2,
"RNG": 9
},
"TRNG": {
"TRNG": 14
}
},
"side_channel_analysis": {
"FI": {
"DFA": 7,
"Malfunction": 12,
"fault induction": 1,
"malfunction": 1
},
"SCA": {
"DPA": 10,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 5,
"physical probing": 1,
"side channel": 7
}
},
"standard_id": {
"BSI": {
"AIS31": 4,
"AIS32": 4
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2
},
"FIPS": {
"FIPS PUB 180-4": 2,
"FIPS PUB 197": 2
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 18092": 6,
"ISO/IEC 7816-3": 1,
"ISO/IEC18092": 6
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 5639": 1,
"RFC3447": 11
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 24
}
},
"DES": {
"3DES": {
"3DES": 17,
"Triple-DES": 3
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon Technologies": 7,
"Infineon Technologies AG": 15
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Hans-Ulrich Buchm\u00fcller; modified by Steffen Heinkel",
"/CreationDate": "D:20120516160724+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120622123754+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "Security Target",
"pdf_file_size_bytes": 1135564,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 81
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d2f0d771435eb5daf0d94da7e4d15a035295e7fc75dce75d8b8e4190f1438eea",
"txt_hash": "18d056d0b014de3fae27c137b5a485f72e46868219e7a9d9a1bed03476a7ae12"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "03e405dd9b5f1957d81d9c84fc9f486576df46cf824293071e171c90e4028f94",
"txt_hash": "e3c8980e6258e869dbabc9fd66d00c6f72209b9fb10a82efc4d2838307d6be8e"
}
},
"status": "archived"
}