This page was not yet optimized for use on mobile
devices.
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
CSV information
| Status | archived |
|---|---|
| Valid from | 17.11.2020 |
| Valid until | 17.11.2025 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL6+, ALC_FLR.1 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1107-2020
Certificate
Extracted keywords
Vendor
Infineon Technologies AGSecurity level
EAL 6, EAL 5, EAL 2, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLRProtection profiles
BSI-CC-PP- 0084-2014Certificates
BSI-DSZ-CC-1107-2020Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
| Title | Certificate BSI-DSZ-CC-1107-2020 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084 |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20201124150949+01'00' |
| Modification date | D:20201124151045+01'00' |
| Pages | 1 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, TDES, TDEA, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-256Schemes
MAC, Key Exchange, Key agreement, Key AgreementRandomness
RNG, RBGBlock cipher modes
ECB, CBC, CTR, CFB, CCMVendor
Infineon Technologies AG, Infineon, Infineon Technologies, G&D, Giesecke & DevrientSecurity level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL5+, EAL6, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC, AGD_PPUM, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3Security Functional Requirements (SFR)
FCS_CKM.1Protection profiles
BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1107-2020Evaluation facilities
TÜV InformationstechnikSide-channel analysis
physical probing, SPA, DPA, DFACertification process
out of scope, 000, 2020-02-07 Table 2: Deliverables of the TOE Please note that NRG functionality and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective, being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 3, 2020-11-13, “ETR Summary”, TÜV Informationstechnik, confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, BSI-DSZ-CC-1107-2020, Version 3, 2020-11-13, “ETR for Composition”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, 2019-09-13, “Configuration Management Plan” (confidential, Standards Compliance Verification”, Version 1, 2020-07-14, TÜV Informationstechnik GmbH (confidential document) [22] “Site Technical Audit Report (STAR) Amkor Technology, Portugal”, Version 1, 2020- 10-12, TÜVStandards
FIPS197, FIPS186-4, FIPS PUB 186-4, PKCS #1, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 23, AIS 25, AIS 26, AIS 27, AIS 31, AIS 32, AIS 35, AIS 36, AIS 37, AIS 38, AIS 41, AIS 46, AIS 47, AIS31, AIS20, AIS 30, RFC5639, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1107-2020 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20201124145337+01'00' |
| Modification date | D:20201124150440+01'00' |
| Pages | 36 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1107-2020 |
|---|---|
| Certified item | IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Incoming- ANSSI-CC-2022/14 - archived - CombICAO Applet v3 on ID-One Cosmo X (BAC and CA Configuration) SAAAAR : 203742
- ANSSI-CC-2021/29 - archived - ID-One COSMO X Code SAAAAR : 093363
- ANSSI-CC-2021/43 - active - eTravel 2.5 BAC on MultiApp V5.0 (version 2.5.0.0)
- ANSSI-CC-2022/17 - archived - CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742
- ANSSI-CC-2022/16 - archived - CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742
- ANSSI-CC-2021/45 - active - eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0)
- ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
- ANSSI-CC-2022/18 - archived - CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742
- ANSSI-CC-2022/15 - archived - CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742
- ANSSI-CC-2022/53 - active - BelPIC V1.8 on MultiApp V5.0 Platform
- ANSSI-CC-2021/44 - active - eTravel 2.5 EAC on BAC on MultiApp V5.0
- ANSSI-CC-2021/54 - active - IAS Classic v5.2 on MultiApp V5.0
- ANSSI-CC-2021/36 - archived - ID-A v1.0 on ID-ONE COSMO X Code SAAAR de l’applet : 417692 Code SAAAR du Common package : 417641
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, SM4, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-256, MD5Schemes
MAC, Key AgreementRandomness
TRNG, PRNG, RNG, RNDBlock cipher modes
ECB, CBC, CTR, CFBVendor
Infineon Technologies, Infineon Technologies AG, InfineonSecurity level
EAL6+, EAL6, EAL 6, EAL5+, EAL6 augmented, EAL 6 augmentedClaims
O.RND, O.TDES, O.AES, O.RSA, O.ECC, O.AES-TDES-MAC, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_IMP, ADV_FSP, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_CMS, ALC_CMS.4, ALC_CMC, ALC_FLR, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_COP, FCS_CKM, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_SDC, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_UCT.1.1, FDP_UIT.1.2, FIA_API, FIA_API.1, FIA_UID, FIA_UID.1, FIA_UID.2, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FPT_TST.2, FPT_TST, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
Leak-Inherent, Physical Probing, side channel, SPA, DPA, Malfunction, DFAStandards
FIPS PUB 197, AIS31, RFC 5639, ISO/IEC 7816-3, ISO/IEC 14443, ISO/IEC 18092, ISO/IEC 14443-4, ISO/IEC14443-3, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Title | Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx |
|---|---|
| Keywords | 32-bit security controller |
| Author | Infineon Technologies AG |
| Creation date | D:20201127091611+01'00' |
| Modification date | D:20201127091611+01'00' |
| Pages | 69 |
| Creator | Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx |
| Producer | Nuance PDF Create 8 |
References
Incoming- ANSSI-CC-2021/29 - archived - ID-One COSMO X Code SAAAAR : 093363
- NSCIB-CC-0362720-CR - active - TnD v5.1 on ID-One Cosmo X (EAC Configuration)
- ANSSI-CC-2021/43 - active - eTravel 2.5 BAC on MultiApp V5.0 (version 2.5.0.0)
- ANSSI-CC-2021/45 - active - eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0)
- ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
- NSCIB-CC-0362721-CR - archived - TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration)
- ANSSI-CC-2022/53 - active - BelPIC V1.8 on MultiApp V5.0 Platform
- ANSSI-CC-2021/44 - active - eTravel 2.5 EAC on BAC on MultiApp V5.0
- ANSSI-CC-2021/36 - archived - ID-A v1.0 on ID-ONE COSMO X Code SAAAR de l’applet : 417692 Code SAAAR du Common package : 417641
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1107-2020Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 62.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107c_pdf.pdf",
"dgst": "3a743d7536826ace",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1107-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"05.03.4097",
"3.02.000",
"3.52.9708",
"2.11.003",
"01.30.0564",
"80.306.16.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"cf0f01bcd7be3e9c"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2021/54",
"ANSSI-CC-2022/18",
"ANSSI-CC-2021/44",
"ANSSI-CC-2022/14",
"ANSSI-CC-2021/42",
"ANSSI-CC-2022/15",
"ANSSI-CC-2021/29",
"ANSSI-CC-2021/43",
"ANSSI-CC-2022/17",
"ANSSI-CC-2022/16",
"ANSSI-CC-2021/45",
"ANSSI-CC-2021/36",
"ANSSI-CC-2022/53"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2022/36",
"ANSSI-CC-2021/42",
"ANSSI-CC-2022/57",
"ANSSI-CC-2021/43",
"ANSSI-CC-2022/13",
"ANSSI-CC-2022/53",
"ANSSI-CC-2021/36v2",
"ANSSI-CC-2022/37",
"ANSSI-CC-2022/12",
"ANSSI-CC-2021/29",
"NSCIB-CC-0362720-CR",
"ANSSI-CC-2022/16",
"ANSSI-CC-2022/17v2",
"ANSSI-CC-2021/36",
"ANSSI-CC-2022/34v2",
"ANSSI-CC-2022/11",
"ANSSI-CC-2021/54",
"ANSSI-CC-2022/10",
"NSCIB-CC-0362721-CR",
"ANSSI-CC-2022/15",
"ANSSI-CC-2022/54",
"ANSSI-CC-2022/56",
"ANSSI-CC-2022/22",
"ANSSI-CC-2022/17",
"ANSSI-CC-2021/45",
"ANSSI-CC-2022/55",
"ANSSI-CC-2023/29",
"ANSSI-CC-2022/23",
"ANSSI-CC-2022/18",
"ANSSI-CC-2021/44",
"ANSSI-CC-2022/15v2",
"ANSSI-CC-2022/14",
"ANSSI-CC-2022/14v2",
"ANSSI-CC-2022/52",
"ANSSI-CC-2022/34",
"ANSSI-CC-2022/18v2",
"ANSSI-CC-2022/16v2"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-0362721-CR",
"ANSSI-CC-2021/44",
"ANSSI-CC-2021/42",
"ANSSI-CC-2021/29",
"ANSSI-CC-2021/43",
"NSCIB-CC-0362720-CR",
"ANSSI-CC-2021/45",
"ANSSI-CC-2021/36",
"ANSSI-CC-2022/53"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2023/24",
"ANSSI-CC-2021/36v2",
"ANSSI-CC-2022/18",
"NSCIB-CC-0362721-CR",
"ANSSI-CC-2021/44",
"ANSSI-CC-2022/36",
"ANSSI-CC-2022/15",
"ANSSI-CC-2021/42",
"ANSSI-CC-2022/14",
"ANSSI-CC-2021/29",
"ANSSI-CC-2021/43",
"ANSSI-CC-2022/17",
"NSCIB-CC-0362720-CR",
"ANSSI-CC-2022/34",
"ANSSI-CC-2022/16",
"ANSSI-CC-2021/45",
"ANSSI-CC-2021/36",
"ANSSI-CC-2022/53"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG\u2122 SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance",
"not_valid_after": "2025-11-17",
"not_valid_before": "2020-11-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1107c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1,
"EAL 6": 1,
"EAL 6 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20201124150949+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084",
"/ModDate": "D:20201124151045+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria Certification",
"/Title": "Certificate BSI-DSZ-CC-1107-2020",
"pdf_file_size_bytes": 243258,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1107a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1107-2020",
"cert_item": "IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG\u2122 SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP- 0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-2020": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 1,
"BSI-CC-PP-0084-2014": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 3
},
"AGD": {
"AGD_PPUM": 3
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 4,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL5+": 1,
"EAL6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"BSI-DSZ-CC-1107-2020, Version 3, 2020-11-13, \u201cETR for Composition\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, 2019-09-13, \u201cConfiguration Management Plan\u201d (confidential": 1,
"IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target\u201d, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 3, 2020-11-13, \u201cETR Summary\u201d, T\u00dcV Informationstechnik": 1,
"Standards Compliance Verification\u201d, Version 1, 2020-07-14, T\u00dcV Informationstechnik GmbH (confidential document) [22] \u201cSite Technical Audit Report (STAR) Amkor Technology, Portugal\u201d, Version 1, 2020- 10-12, T\u00dcV": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1
},
"OutOfScope": {
"000, 2020-02-07 Table 2: Deliverables of the TOE Please note that NRG functionality and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 2
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 31
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1,
"RNG": 9
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2
},
"SCA": {
"DPA": 2,
"SPA": 2,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 2,
"AIS 23": 1,
"AIS 25": 1,
"AIS 26": 1,
"AIS 27": 1,
"AIS 30": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS 41": 1,
"AIS 46": 1,
"AIS 47": 1,
"AIS20": 3,
"AIS31": 4
},
"FIPS": {
"FIPS PUB 186-4": 1,
"FIPS186-4": 6,
"FIPS197": 3
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS #1": 8
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 4,
"Triple-DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1,
"Giesecke \u0026 Devrient": 1
},
"Infineon": {
"Infineon": 3,
"Infineon Technologies": 9,
"Infineon Technologies AG": 22
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20201124145337+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084\"",
"/ModDate": "D:20201124150440+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-1107-2020",
"pdf_file_size_bytes": 467899,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "1107b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 23
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 2,
"O.AES-TDES-MAC": 5,
"O.ECC": 5,
"O.RND": 1,
"O.RSA": 5,
"O.TDES": 2
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 2,
"ADV_FSP.5": 4,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_INT.3": 1,
"ADV_SPM.1": 6,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 3,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 4,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL": 4,
"ASE_CCL.1": 1,
"ASE_ECD": 4,
"ASE_ECD.1": 1,
"ASE_INT": 14,
"ASE_INT.1": 1,
"ASE_OBJ": 6,
"ASE_OBJ.2": 1,
"ASE_REQ": 30,
"ASE_REQ.2": 1,
"ASE_SPD": 4,
"ASE_SPD.1": 1,
"ASE_TSS": 5,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 2,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL 6 augmented": 2,
"EAL5+": 1,
"EAL6": 5,
"EAL6 augmented": 2,
"EAL6+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 4,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 28,
"FCS_CKM.1": 19,
"FCS_CKM.2": 3,
"FCS_CKM.4": 15,
"FCS_COP": 34,
"FCS_COP.1": 13,
"FCS_RNG": 23,
"FCS_RNG.1": 11
},
"FDP": {
"FDP_ACC": 10,
"FDP_ACC.1": 18,
"FDP_ACC.1.1": 1,
"FDP_ACF": 11,
"FDP_ACF.1": 15,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 8,
"FDP_ITC.1": 15,
"FDP_ITC.2": 15,
"FDP_ITT.1": 4,
"FDP_SDC": 2,
"FDP_SDC.1": 5,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 2,
"FDP_UIT.1": 9,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 2,
"FIA_API.1": 7,
"FIA_API.1.1": 1,
"FIA_UID": 7,
"FIA_UID.1": 6,
"FIA_UID.2": 3
},
"FMT": {
"FMT_LIM": 16,
"FMT_LIM.1": 8,
"FMT_LIM.2": 6,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 10,
"FMT_MTD.1": 1,
"FMT_SMF": 8,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 8,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_ITT.1": 4,
"FPT_PHP.3": 4,
"FPT_TST": 5,
"FPT_TST.1": 11,
"FPT_TST.2": 28,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT.2": 5
},
"FTP": {
"FTP_ITC.1": 15,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RND": 2,
"RNG": 30
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 5
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 5,
"Physical Probing": 2,
"SPA": 1,
"side channel": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 9
},
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 14443-4": 1,
"ISO/IEC 18092": 4,
"ISO/IEC 7816-3": 1,
"ISO/IEC14443-3": 1
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 17,
"Triple-DES": 1
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
},
"miscellaneous": {
"SM4": {
"SM4": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 3,
"Infineon Technologies": 7,
"Infineon Technologies AG": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Infineon Technologies AG",
"/CreationDate": "D:20201127091611+01\u002700\u0027",
"/Creator": "Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx",
"/Keywords": "32-bit security controller",
"/ModDate": "D:20201127091611+01\u002700\u0027",
"/Producer": "Nuance PDF Create 8",
"/Title": "Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx",
"pdf_file_size_bytes": 556806,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL6+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1510e51ff2a3776d4bcc892909c82ecede5b53c87ceef7b4c6b321004d4fddc6",
"txt_hash": "d3c8dc85c70d2b965c43a09003de09811c513754615f294ecb89e353ef6eb476"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f9f02a7cc62d69aeeab52730b0ec09c1164def94afc085feb805fab169692d8a",
"txt_hash": "e901b1ca784fd7c9088641c6f6096ba18b49d14bbc1c15cd36ce43c3f71fef83"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9eec0acaf939ff46915c7cbd7455bb7c836783630e869100fc63acb15b59f97e",
"txt_hash": "eeabc40ab1d7090d1b59567d9cf1ba2d939501edaed739c66971b22ea5763975"
}
},
"status": "archived"
}