{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10c_pdf.pdf",
"dgst": "bd1fa4fd97e8abad",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0827",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.09.002",
"2.07.003"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V8-2020"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V9-2024"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1158-V3-2025",
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-1158-V4-2025",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-1158-V2-2023",
"BSI-DSZ-CC-1158-2020"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017",
"BSI-DSZ-CC-0827-V5-2017",
"BSI-DSZ-CC-0827-V3-2015",
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-0791-2012",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-0827-V2-2014",
"BSI-DSZ-CC-0827-V4-2016",
"BSI-DSZ-CC-0827-2013",
"BSI-DSZ-CC-0827-V7-2018"
]
}
},
"scheme_data": {
"category": "Smart Cards and similar devices",
"cert_id": "BSI-DSZ-CC-0827-V10-2025",
"certification_date": "2025-11-04",
"enhanced": {
"applicant": "Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg",
"assurance_level": "EAL 5+,ALC_DVS.2,AVA_VAN.5",
"certification_date": "2025-11-04",
"description": "The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M9900 A21 with optional Software Libraries RSA2048 v1.03.006 \u2013 RSA4096 v1.03.006 \u2013 EC v1.03.006 \u2013 Toolbox v1.03.006 \u2013 FTL v1.01.0008 and with specific IC dedicated software. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit), the Cache system, the MPU (Memory Protection Unit) and MED (Memory Encryption/Decryption Unit. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA and EC and the supporting libraries Toolbox, Base and FTL. RSA, EC, Toolbox, and FTL provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software.",
"entries": [
{
"description": "In comparison to the TOE forerunner, the CC version has been updated to version CC-2022. Moreover, the derivates M9900 A22/C22/D22/G11 and M9906 A11 were removed from the certification scope, and the scope of cryptographic functions has been reduced.",
"id": "BSI-DSZ-CC-0827-V10-2025"
},
{
"description": "In comparison to the TOE forerunner changes were conducted in TOE documentation (guidance), and the certification scope has been reduced.",
"id": "BSI-DSZ-CC-0827-V9-2024"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0827-V8-2020 (Ausstellungsdatum / Certification Date 06.07.2020, g\u00fcltig bis / valid until 05.07.2025)"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0827-V7-2018 (Ausstellungsdatum / Certification Date 14.09.2018, g\u00fcltig bis / valid until 13.09.2023)"
},
{
"description": "forerunner, the changes comprise the addition of new software library versions and change of the respective guidance documentations.",
"id": "BSI-DSZ-CC-0827-V6-2017 (Ausstellungsdatum / Certification Date 02.11.2017, g\u00fcltig bis / valid until 01.11.2022)"
},
{
"description": "design step. Furthermore, adjustments and changes in guidance documentations apply.",
"id": "BSI"
},
{
"description": "The changes, compared to the preceding certification, consist of addition of a new configuration as well as addition of optional software libraries.",
"id": "BSI-DSZ-CC-0827-V4-2016 (Ausstellungsdatum / Certification Date 23.11.2016, g\u00fcltig bis / valid until 22.11.2021)"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-0827-V3-2015 (Ausstellungsdatum / Certification Date 03.11.2015, g\u00fcltig bis / valid until 02.11.2020)"
},
{
"description": "in Taiwan.",
"id": "BSI-DSZ-CC-0827-V2-2014 (30.04.2014) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target"
},
{
"description": "dedicated software",
"id": "BSI-DSZ-CC-0827-2013-MA-01 (19.06.2013)"
},
{
"description": "Security Target",
"id": "BSI"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2030-11-03",
"product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"protection_profile": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10c_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"subcategory": "ICs, Cryptolib",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0827.html",
"vendor": "Infineon Technologies AG"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"not_valid_after": "2030-11-04",
"not_valid_before": "2025-11-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0827V10c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "Common Criteria, Certification, Zertifizierung",
"/Subject": "Common Criteria, Certification, Zertifizierung",
"/Title": "Certificate BSI-DSZ-CC-0827-V10-2025",
"pdf_file_size_bytes": 233413,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0827V10a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 3 November 2030 SOGIS Recognition Agreement",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0827-V10-2025",
"cert_item": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V9-2024": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 2
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 8,
"EAL 5 augmented": 3,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"2, 2025-09-26, T\u00dcV Informationstechnik GmbH (confidential document) [12] \u201cSite Technical Audit Report (STAR) DNP Photomask Europe S.p.A., Agrate, Italy\u201d, version 1": 1,
"Including optional Software Libraries \u2013 EC\u201d, Version 2.2, 2025-10-21, Infineon (confidential document) 22 / 25 BSI-DSZ-CC-0827-V10-2025 Certification Report C. Excerpts from the Criteria For the": 1,
"REPORT SUMMARY (ETR SUMMARY)\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC- PP-0035-2007 [8": 1,
"T\u00dcV Informationstechnik GmbH (confidential document) [13] \u201cImpact Analysis for Common Criteria with Evaluation Assurance Level EAL5 augmented (EAL5+": 1,
"Version 6.2, 2025-07-18, \u201cSecurity Target M9905 with optional ACL Software Libraries\u201d, Infineon (confidential document) [6] Evaluation Technical Report, BSI-DSZ-CC-0827-V10-2025, Version 3, 2025-09-26, \u201cEVALUATION": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"including optional Software Libraries EC\u201d, Infineon (confidential document) [11] \u201cSite Technical Audit Report (STAR) Infineon Technologies IT Services GmbH, Klagenfurt": 1,
"\u201cEVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 1.6, 2025-06-23, \u201cConfiguration Management Scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 34": 1,
"AIS 35": 1,
"AIS 36": 1,
"AIS31": 1
},
"FIPS": {
"FIPS186-4": 6,
"FIPS197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 7816-3": 1
},
"RFC": {
"RFC5639": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon Technologies": 9,
"Infineon Technologies AG": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
"/Subject": "Common Criteria, Certification, Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-0827-V10-2025",
"pdf_file_size_bytes": 392203,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "0827V10b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 43
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {
"NL": {
"CC-1": 4,
"CC-2": 17,
"CC-3": 3,
"CC-4": 2,
"CC-5": 2
}
},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP- 0035": 1,
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_COMP.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 2,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL": 3,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 3,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 3,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 4,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL5": 6,
"EAL5 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 8,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 8,
"FCS_CKM.1": 21,
"FCS_CKM.2": 4,
"FCS_CKM.4": 3,
"FCS_CKM.5": 17,
"FCS_CKM.6": 19,
"FCS_COP": 32,
"FCS_COP.1": 23,
"FCS_RBG.1": 4,
"FCS_RNG": 4,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 23,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 19,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 14,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_ITT.1": 11,
"FDP_PHP.3": 1,
"FDP_SDI.1": 17,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 14,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2
},
"FMT": {
"FMT_LIM": 2,
"FMT_LIM.1": 13,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 12,
"FMT_LIM.2.1": 1,
"FMT_MSA": 2,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 18,
"FPT_ITT.1": 13,
"FPT_PHP.3": 14,
"FPT_TST": 5,
"FPT_TST.1": 12,
"FPT_TST.2": 36,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 8
}
},
"certification_process": {
"OutOfScope": {
" 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification": 1,
"ACL 9 Software Libraries . 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification. 12 6 6.2 2025-07-18 Security Target Lite M9905 with optional ACL": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 38": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 11
},
"TRNG": {
"TRNG": 14
}
},
"side_channel_analysis": {
"FI": {
"DFA": 5,
"Malfunction": 12,
"malfunction": 1
},
"SCA": {
"DPA": 5,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 4,
"Side-channel": 1,
"Timing Attack": 1,
"physical probing": 1,
"side channel": 5
},
"other": {
"JIL": 2,
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 6
},
"CC": {
"CCMB-2022-11-001": 2,
"CCMB-2022-11-002": 2,
"CCMB-2022-11-003": 2,
"CCMB-2022-11-004": 2,
"CCMB-2022-11-005": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 7816-3": 1,
"ISO/IEC14443-3": 1
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"3DES": 12,
"TDEA": 1,
"Triple-DES": 3
},
"DES": {
"DES": 5
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 4
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 7,
"Infineon Technologies": 7,
"Infineon Technologies AG": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Urian Rainer (IFAG CCS SQM PS)",
"/Keywords": "Infineon",
"pdf_file_size_bytes": 1052345,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc5639.txt",
"mailto:[email protected]",
"http://www.infineon.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 67
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "dbb14609a0d775b418e30e7c9d7b964cc4a9222b01a01398a24a510f34fe1168",
"txt_hash": "1a844fa4e426e9f61a787b12ea6289af3df1efd951ec2782ce9989456de9e491"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b8e2360d48cf99b5c2e824f67b0139eb92efa2c92924815ed0e8766be50f2284",
"txt_hash": "d39163bf6b98024af9d08e4c2480f7f4dd24192f18075fcabbb5033eb4f18528"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0e99a00d91fa2cdf07e760b288bdaee474d94cf2bec21dd90e6af9dbe0953227",
"txt_hash": "9e15bafb0daceab4dae8d79af7c803e6b0f853d6d1427807c9df35806cb26ed6"
}
},
"status": "active"
}