This page was not yet optimized for use on mobile
devices.
Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002
CSV information
| Status | active |
|---|---|
| Valid from | 04.11.2025 |
| Valid until | 04.11.2030 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0827
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
Infineon Technologies, Infineon Technologies AGSecurity level
EAL 5, EAL 2, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0035-2007Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, 3DESAsymmetric Algorithms
ECDH, ECDSA, ECCSchemes
Key AgreementRandomness
RNGBlock cipher modes
ECB, CBCVendor
Infineon Technologies, Infineon Technologies AG, InfineonSecurity level
EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL5, EAL5+, EAL 5 augmented, EAL5 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0827-V9-2024Evaluation facilities
TĂśV InformationstechnikSide-channel analysis
physical probing, SPA, DPA, physical tampering, DFACertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 6.2, 2025-07-18, “Security Target M9905 with optional ACL Software Libraries”, Infineon (confidential document) [6] Evaluation Technical Report, BSI-DSZ-CC-0827-V10-2025, Version 3, 2025-09-26, “EVALUATION, REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik GmbH, (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC- PP-0035-2007 [8, “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 1.6, 2025-06-23, “Configuration Management Scope, including optional Software Libraries EC”, Infineon (confidential document) [11] “Site Technical Audit Report (STAR) Infineon Technologies IT Services GmbH, Klagenfurt, 2, 2025-09-26, TÜV Informationstechnik GmbH (confidential document) [12] “Site Technical Audit Report (STAR) DNP Photomask Europe S.p.A., Agrate, Italy”, version 1, TÜV Informationstechnik GmbH (confidential document) [13] “Impact Analysis for Common Criteria with Evaluation Assurance Level EAL5 augmented (EAL5+, Including optional Software Libraries – EC”, Version 2.2, 2025-10-21, Infineon (confidential document) 22 / 25 BSI-DSZ-CC-0827-V10-2025 Certification Report C. Excerpts from the Criteria For theStandards
FIPS186-4, FIPS197, AIS 34, AIS 36, AIS31, AIS 35, RFC5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816-3Technical reports
BSI TR-02102File metadata
| Title | Certification Report BSI-DSZ-CC-0827-V10-2025 |
|---|---|
| Subject | Common Criteria, Certification, Zertifizierung |
| Keywords | "Common Criteria, Certification, Zertifizierung" |
| Author | Federal Office for Information Security |
| Pages | 25 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0827-V10-2025 |
|---|---|
| Certified item | Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002 |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0827-V9-2024 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
- BSI-DSZ-CC-0827-V8-2020 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDEAAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSASchemes
Key AgreementRandomness
TRNG, RNG, RNDLibraries
Crypto Library 38Block cipher modes
ECB, CBCTrusted Execution Environments
SSCVendor
Infineon Technologies, Infineon Technologies AG, InfineonSecurity level
EAL5+, EAL5, EAL 5, EAL5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_COMP.1, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_TAT, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_COP.1, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_CKM.6, FCS_CKM.5, FCS_CKM, FCS_CKM.2, FCS_RNG.1, FCS_RBG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_PHP.3, FMT_MSA, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS, FRU_FLT.2Protection profiles
BSI-PP- 0035, BSI-CC-PP-0035-2007, BSI-PP-0035Certificates
CC-1, CC-2, CC-3, CC-4, CC-5Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, Side-channel, SPA, DPA, Timing Attack, Malfunction, malfunction, DFA, reverse engineering, JILCertification process
out of scope, 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification, ACL 9 Software Libraries . 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification. 12 6 6.2 2025-07-18 Security Target Lite M9905 with optional ACLStandards
FIPS PUB 197, AIS31, RFC 5639, ISO/IEC 7816-3, ISO/IEC14443-3, CCMB-2022-11-001, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005File metadata
| Keywords | Infineon |
|---|---|
| Author | Urian Rainer (IFAG CCS SQM PS) |
| Pages | 67 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0827Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 24.
Scheme data
| Cert Id | BSI-DSZ-CC-0827-V10-2025 | |
|---|---|---|
| Product | Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002 | |
| Vendor | Infineon Technologies AG | |
| Certification Date | 04.11.2025 | |
| Category | Smart Cards and similar devices | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0827.html | |
| Enhanced | ||
| Product | Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002 | |
| Applicant | Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg | |
| Evaluation Facility | TĂśV Informationstechnik GmbH | |
| Assurance Level | EAL 5+,ALC_DVS.2,AVA_VAN.5 | |
| Protection Profile | Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 | |
| Certification Date | 04.11.2025 | |
| Expiration Date | 03.11.2030 | |
| Entries | [frozendict({'id': 'BSI-DSZ-CC-0827-V10-2025', 'description': 'In comparison to the TOE forerunner, the CC version has been updated to version CC-2022. Moreover, the derivates M9900 A22/C22/D22/G11 and M9906 A11 were removed from the certification scope, and the scope of cryptographic functions has been reduced.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V9-2024', 'description': 'In comparison to the TOE forerunner changes were conducted in TOE documentation (guidance), and the certification scope has been reduced.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V8-2020 (Ausstellungsdatum / Certification Date 06.07.2020, gĂĽltig bis / valid until 05.07.2025)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0827-V7-2018 (Ausstellungsdatum / Certification Date 14.09.2018, gĂĽltig bis / valid until 13.09.2023)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0827-V6-2017 (Ausstellungsdatum / Certification Date 02.11.2017, gĂĽltig bis / valid until 01.11.2022)', 'description': 'forerunner, the changes comprise the addition of new software library versions and change of the respective guidance documentations.'}), frozendict({'id': 'BSI', 'description': 'design step. Furthermore, adjustments and changes in guidance documentations apply.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V4-2016 (Ausstellungsdatum / Certification Date 23.11.2016, gĂĽltig bis / valid until 22.11.2021)', 'description': 'The changes, compared to the preceding certification, consist of addition of a new configuration as well as addition of optional software libraries.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V3-2015 (Ausstellungsdatum / Certification Date 03.11.2015, gĂĽltig bis / valid until 02.11.2020)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0827-V2-2014 (30.04.2014) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target', 'description': 'in Taiwan.'}), frozendict({'id': 'BSI-DSZ-CC-0827-2013-MA-01 (19.06.2013)', 'description': 'dedicated software'}), frozendict({'id': 'BSI', 'description': 'Security Target'})] | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10c_pdf.pdf?__blob=publicationFile&v=2 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10b_pdf.pdf?__blob=publicationFile&v=2 | |
| Description | The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M9900 A21 with optional Software Libraries RSA2048 v1.03.006 – RSA4096 v1.03.006 – EC v1.03.006 – Toolbox v1.03.006 – FTL v1.01.0008 and with specific IC dedicated software. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit), the Cache system, the MPU (Memory Protection Unit) and MED (Memory Encryption/Decryption Unit. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA and EC and the supporting libraries Toolbox, Base and FTL. RSA, EC, Toolbox, and FTL provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software. | |
| Subcategory | ICs, Cryptolib | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10c_pdf.pdf",
"dgst": "bd1fa4fd97e8abad",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0827",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.07.003",
"2.09.002"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V8-2020"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V9-2024"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1158-V3-2025",
"BSI-DSZ-CC-1158-V2-2023",
"BSI-DSZ-CC-1158-2020",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-1158-V4-2025",
"BSI-DSZ-CC-0827"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V2-2014",
"BSI-DSZ-CC-0827-V4-2016",
"BSI-DSZ-CC-0827-V5-2017",
"BSI-DSZ-CC-0827-V6-2017",
"BSI-DSZ-CC-0827-2013",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-0827-V7-2018",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0791-2012",
"BSI-DSZ-CC-0827-V3-2015",
"BSI-DSZ-CC-0827"
]
}
},
"scheme_data": {
"category": "Smart Cards and similar devices",
"cert_id": "BSI-DSZ-CC-0827-V10-2025",
"certification_date": "2025-11-04",
"enhanced": {
"applicant": "Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg",
"assurance_level": "EAL 5+,ALC_DVS.2,AVA_VAN.5",
"certification_date": "2025-11-04",
"description": "The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M9900 A21 with optional Software Libraries RSA2048 v1.03.006 \u2013 RSA4096 v1.03.006 \u2013 EC v1.03.006 \u2013 Toolbox v1.03.006 \u2013 FTL v1.01.0008 and with specific IC dedicated software. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit), the Cache system, the MPU (Memory Protection Unit) and MED (Memory Encryption/Decryption Unit. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA and EC and the supporting libraries Toolbox, Base and FTL. RSA, EC, Toolbox, and FTL provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software.",
"entries": [
{
"description": "In comparison to the TOE forerunner, the CC version has been updated to version CC-2022. Moreover, the derivates M9900 A22/C22/D22/G11 and M9906 A11 were removed from the certification scope, and the scope of cryptographic functions has been reduced.",
"id": "BSI-DSZ-CC-0827-V10-2025"
},
{
"description": "In comparison to the TOE forerunner changes were conducted in TOE documentation (guidance), and the certification scope has been reduced.",
"id": "BSI-DSZ-CC-0827-V9-2024"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0827-V8-2020 (Ausstellungsdatum / Certification Date 06.07.2020, g\u00fcltig bis / valid until 05.07.2025)"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0827-V7-2018 (Ausstellungsdatum / Certification Date 14.09.2018, g\u00fcltig bis / valid until 13.09.2023)"
},
{
"description": "forerunner, the changes comprise the addition of new software library versions and change of the respective guidance documentations.",
"id": "BSI-DSZ-CC-0827-V6-2017 (Ausstellungsdatum / Certification Date 02.11.2017, g\u00fcltig bis / valid until 01.11.2022)"
},
{
"description": "design step. Furthermore, adjustments and changes in guidance documentations apply.",
"id": "BSI"
},
{
"description": "The changes, compared to the preceding certification, consist of addition of a new configuration as well as addition of optional software libraries.",
"id": "BSI-DSZ-CC-0827-V4-2016 (Ausstellungsdatum / Certification Date 23.11.2016, g\u00fcltig bis / valid until 22.11.2021)"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-0827-V3-2015 (Ausstellungsdatum / Certification Date 03.11.2015, g\u00fcltig bis / valid until 02.11.2020)"
},
{
"description": "in Taiwan.",
"id": "BSI-DSZ-CC-0827-V2-2014 (30.04.2014) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target"
},
{
"description": "dedicated software",
"id": "BSI-DSZ-CC-0827-2013-MA-01 (19.06.2013)"
},
{
"description": "Security Target",
"id": "BSI"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2030-11-03",
"product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"protection_profile": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10c_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"subcategory": "ICs, Cryptolib",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0827.html",
"vendor": "Infineon Technologies AG"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"not_valid_after": "2030-11-04",
"not_valid_before": "2025-11-04",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "0827V10c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "0827V10a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 3 November 2030 SOGIS Recognition Agreement",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0827-V10-2025",
"cert_item": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V9-2024": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 2
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 8,
"EAL 5 augmented": 3,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"2, 2025-09-26, T\u00dcV Informationstechnik GmbH (confidential document) [12] \u201cSite Technical Audit Report (STAR) DNP Photomask Europe S.p.A., Agrate, Italy\u201d, version 1": 1,
"Including optional Software Libraries \u2013 EC\u201d, Version 2.2, 2025-10-21, Infineon (confidential document) 22 / 25 BSI-DSZ-CC-0827-V10-2025 Certification Report C. Excerpts from the Criteria For the": 1,
"REPORT SUMMARY (ETR SUMMARY)\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC- PP-0035-2007 [8": 1,
"T\u00dcV Informationstechnik GmbH (confidential document) [13] \u201cImpact Analysis for Common Criteria with Evaluation Assurance Level EAL5 augmented (EAL5+": 1,
"Version 6.2, 2025-07-18, \u201cSecurity Target M9905 with optional ACL Software Libraries\u201d, Infineon (confidential document) [6] Evaluation Technical Report, BSI-DSZ-CC-0827-V10-2025, Version 3, 2025-09-26, \u201cEVALUATION": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"including optional Software Libraries EC\u201d, Infineon (confidential document) [11] \u201cSite Technical Audit Report (STAR) Infineon Technologies IT Services GmbH, Klagenfurt": 1,
"\u201cEVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 1.6, 2025-06-23, \u201cConfiguration Management Scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 34": 1,
"AIS 35": 1,
"AIS 36": 1,
"AIS31": 1
},
"FIPS": {
"FIPS186-4": 6,
"FIPS197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 7816-3": 1
},
"RFC": {
"RFC5639": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon Technologies": 9,
"Infineon Technologies AG": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
"/Subject": "Common Criteria, Certification, Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-0827-V10-2025",
"pdf_file_size_bytes": 392203,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "0827V10b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 43
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {
"NL": {
"CC-1": 4,
"CC-2": 17,
"CC-3": 3,
"CC-4": 2,
"CC-5": 2
}
},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP- 0035": 1,
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_COMP.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 2,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL": 3,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 3,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 3,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 4,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL5": 6,
"EAL5 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 8,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 8,
"FCS_CKM.1": 21,
"FCS_CKM.2": 4,
"FCS_CKM.4": 3,
"FCS_CKM.5": 17,
"FCS_CKM.6": 19,
"FCS_COP": 32,
"FCS_COP.1": 23,
"FCS_RBG.1": 4,
"FCS_RNG": 4,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 23,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 19,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 14,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_ITT.1": 11,
"FDP_PHP.3": 1,
"FDP_SDI.1": 17,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 14,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2
},
"FMT": {
"FMT_LIM": 2,
"FMT_LIM.1": 13,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 12,
"FMT_LIM.2.1": 1,
"FMT_MSA": 2,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 18,
"FPT_ITT.1": 13,
"FPT_PHP.3": 14,
"FPT_TST": 5,
"FPT_TST.1": 12,
"FPT_TST.2": 36,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 8
}
},
"certification_process": {
"OutOfScope": {
" 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification": 1,
"ACL 9 Software Libraries . 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification. 12 6 6.2 2025-07-18 Security Target Lite M9905 with optional ACL": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 38": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 11
},
"TRNG": {
"TRNG": 14
}
},
"side_channel_analysis": {
"FI": {
"DFA": 5,
"Malfunction": 12,
"malfunction": 1
},
"SCA": {
"DPA": 5,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 4,
"Side-channel": 1,
"Timing Attack": 1,
"physical probing": 1,
"side channel": 5
},
"other": {
"JIL": 2,
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 6
},
"CC": {
"CCMB-2022-11-001": 2,
"CCMB-2022-11-002": 2,
"CCMB-2022-11-003": 2,
"CCMB-2022-11-004": 2,
"CCMB-2022-11-005": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 7816-3": 1,
"ISO/IEC14443-3": 1
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"3DES": 12,
"TDEA": 1,
"Triple-DES": 3
},
"DES": {
"DES": 5
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 4
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 7,
"Infineon Technologies": 7,
"Infineon Technologies AG": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Urian Rainer (IFAG CCS SQM PS)",
"/Keywords": "Infineon",
"pdf_file_size_bytes": 1052345,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ietf.org/rfc/rfc5639.txt",
"http://www.infineon.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 67
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "dbb14609a0d775b418e30e7c9d7b964cc4a9222b01a01398a24a510f34fe1168",
"txt_hash": "1a844fa4e426e9f61a787b12ea6289af3df1efd951ec2782ce9989456de9e491"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b8e2360d48cf99b5c2e824f67b0139eb92efa2c92924815ed0e8766be50f2284",
"txt_hash": "d39163bf6b98024af9d08e4c2480f7f4dd24192f18075fcabbb5033eb4f18528"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0e99a00d91fa2cdf07e760b288bdaee474d94cf2bec21dd90e6af9dbe0953227",
"txt_hash": "9e15bafb0daceab4dae8d79af7c803e6b0f853d6d1427807c9df35806cb26ed6"
}
},
"status": "active"
}