This page was not yet optimized for use on mobile devices.
IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents
CSV information ?
Status | active |
---|---|
Valid from | 17.12.2024 |
Valid until | 17.12.2029 |
Scheme | 🇩🇪 DE |
Manufacturer | Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1 |
Protection profiles |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-1249-2024
Certificate ?
Extracted keywords
Vendor
Infineon Technologies AGSecurity level
EAL 6, EAL 5, EAL 2, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLRProtection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1249-2024Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1249-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum |
Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum" |
Author | Federal Office for Information Security |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-, CMACAsymmetric Algorithms
DSAPost-quantum Algorithms
ML-KEMHash functions
SHA3-224, SHA3-384, SHA3-512, SHA-3Schemes
Key ExchangeRandomness
RNGBlock cipher modes
ECB, CCMVendor
Infineon Technologies AG, Infineon, Infineon TechnologiesSecurity level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL5+, EAL6, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC, AGD_HRM, AGD_PRM, AGD_PPM, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, AVA_VAN.5Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FDP_ITCProtection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0084-Certificates
BSI-DSZ-CC-1249-2024Evaluation facilities
TĂśV InformationstechnikSide-channel analysis
physical probing, physical tamperingCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, SLC21 Post-Quantum Edition Se-curity Target”, Version 1.2, 2024-10-14, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-12-04, “EVALUATION TECHNICAL REPORT SUMMARY (ETR, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, Evaluation (ETR COMP) for the IFX_CCI_000068h, IFX_CCI_000080h G12”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.1, 2024-10-22 (confidential document) [12] (also, Security Controller – V24), Hardware Reference Manual”, v6.0, 2024-06-26, Infineon Technologies AG (confidential document) [13] (also [AGD_PRM]), “TEGRION™ SLx2 security con-troller family, Programmer's Reference Manual, v1.4.0, 2024-05-22, Infineon Technologies AG (confidential document) [14] (also [AGD_SG]), “SLC21, 32-bit Security Controller – V24, Security Guidelines”, v1.00-3001, Infineon Technologies AG (confidential document) [15] (also [AGD_PPM]), “SLC21 (32-bit Security Controller – V24), Production and personalization, Flash Loader V10”, v10.01, 2023-06-28, Infineon Technologies AG (confidential document) [16] (also [AGD_CryptoUM]), “Crypto2304T V4, User Manual”, v3.0, 2024-06-21, Infineon Technologies, confidential document) [17] (also [AGD_CS]), “CS-SLC21V24 CryptoSuite 32-bit Security Controller, User inter- face manual, v5.00.012, 2024-08-27, Infineon Technologies AG (confidential document) 7 See section 9.1 on usage of specific AIS. 27 / 31 Certification Report BSI-DSZ-CC-1249-2024 [18, 32-bit Secu-rity Controller – V24) Errata sheet”, v3.0, 2024-01-09, Infineon Technologies AG (confidential document) [19] “Site Technical Audit Report (STAR) - Infineon Technologies AG, Munich”, Version 4, TÜV Informationstechnik GmbH (confidential document) [20] “Site Technical Audit Report (STAR) - Infineon Technologies Asia Pacific Pte Ltd., Singapore, Version 3, 2024-11-14, TÜV Informationstechnik GmbH (confidential document) 28 / 31 BSI-DSZ-CC-1249-2024 Certification Report C. Excerpts from the Criteria For the meaningStandards
FIPS197, FIPS203, FIPS202, FIPS 197, FIPS PUB 203, FIPS 203, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 23, AIS 25, AIS 26, AIS 27, AIS 31, AIS 32, AIS 35, AIS 36, AIS 37, AIS 38, AIS 39, AIS 41, AIS 46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1249-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum |
Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum" |
Author | Federal Office for Information Security |
Pages | 31 |
Frontpage
Certificate ID | BSI-DSZ-CC-1249-2024 |
---|---|
Certified item | IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents |
Certification lab | BSI |
Developer | Infineon Technologies AG |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, SM4, CMACAsymmetric Algorithms
ECCHash functions
SHA256, SHA-3, SHA3, SHA3-224, SHA3-256, SHA3-384, SHA3-512Randomness
RND, RNGBlock cipher modes
ECB, CCMTrusted Execution Environments
SEVendor
Infineon, Infineon Technologies AG, Infineon TechnologiesSecurity level
EAL6, EAL 6, EAL6 augmentedClaims
O.MLKEM, O.RND, O.AES, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_FSP.4, ADV_IMP.2, ADV_IMP.1, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.5, ALC_CMC.4, ALC_CMS.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_COV.3, ATE_COV.2, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_COP, FCS_CKM.4, FCS_CKM, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4.1, FCS_CKM.2, FCS_COP.1, FDP_SDC.1, FDP_SDI.2, FDP_ACC, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_UCT.1, FDP_UIT.1, FIA_API.1, FIA_UID, FIA_UID.1, FIA_API.1.1, FIA_API, FIA_UID.2, FMT_MSA, FMT_SMF, FMT_SMR, FMT_LIM, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MTD.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side-channel, side channel, Malfunction, JILStandards
FIPS 197, FIPS 202, FIPS 203, FIPS PUB 197, SP 800-38A, SP 800-22, SP 800-38C, SP 800-108, SP 800-38B, SP 800-90A, AIS 31, AIS 46, AIS 20, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | IFX_CCI_00068h Security Target |
---|---|
Subject | Infineon, |
Keywords | Infineon |
Pages | 52 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-1249-2024
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 62.
Scheme data ?
Cert Id | BSI-DSZ-CC-1249-2024 | |
---|---|---|
Product | IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, … | |
Vendor | Infineon Technologies AG | |
Certification Date | 17.12.2024 | |
Category | Smart Cards and similar devices | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1249.html | |
Enhanced | ||
Product | IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents | |
Applicant | Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg | |
Evaluation Facility | TĂśV Informationstechnik GmbH | |
Assurance Level | EAL6+,ALC_FLR.1 | |
Protection Profile | Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014 | |
Certification Date | 17.12.2024 | |
Expiration Date | 16.12.2029 | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249a_pdf.pdf?__blob=publicationFile&v=3 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249b_pdf.pdf?__blob=publicationFile&v=3 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249c_pdf.pdf?__blob=publicationFile&v=3 | |
Description | The TOE is a SmartCard based on a 32-bit Arm v8-M CPU architecture, including documentation and software support libraries with PQC functionality (post quantum cryptography). | |
Subcategory | ICs, Cryptolib |
References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['cf0f01bcd7be3e9c']}, 'eal': 'EAL6+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cc149d30580a603fe02ac651335d068674f95b5672d8eee90f515a58d5761843', 'txt_hash': 'e15a51df055d66c8d115cae279f1792c5a1c204291b25496800c229e78b4a4b6'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '410c34b27f0f45b9498af012353824efd72b5043e3b9cd396d9a7c092e118660', 'txt_hash': '66bb981b3dc9c388eda6a0e81b858cfe55ac9845f15a93a3fa50c6ea7ea93069'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eaf7402d19aa467f6c1a697e7445de04562ce644a0c9d43d719cc81135746b15', 'txt_hash': '87caa230edeec27c328f5920aca2aaa495f92cbdc4cedd25222a452fd60e3d45'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 408251, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum', '/Title': 'Certification Report BSI-DSZ-CC-1249-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1099527, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 52, '/Keywords': 'Infineon', '/Subject': 'Infineon,', '/Title': 'IFX_CCI_00068h Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.infineon.com/', 'mailto:[email protected]']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 231007, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum', '/Title': 'Certificate BSI-DSZ-CC-1249-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1249-2024', 'cert_item': 'IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 16 December 2029 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1249-2024': 18}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 3, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 4, 'EAL 5': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL 4': 1, 'EAL5+': 1, 'EAL6': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 3}, 'AGD': {'AGD_HRM': 4, 'AGD_PRM': 6, 'AGD_PPM': 5}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ITC': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 15, 'Infineon': 1, 'Infineon Technologies': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 6}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7, 'AES-': 7}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {'FIPS': {'ML-KEM': 6}}, 'hash_function': {'SHA': {'SHA3': {'SHA3-224': 1, 'SHA3-384': 1, 'SHA3-512': 1, 'SHA-3': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 13}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CCM': {'CCM': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 3, 'FIPS203': 5, 'FIPS202': 3, 'FIPS 197': 1, 'FIPS PUB 203': 1, 'FIPS 203': 1}, 'BSI': {'AIS 34': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 1, 'AIS 23': 1, 'AIS 25': 1, 'AIS 26': 1, 'AIS 27': 1, 'AIS 31': 2, 'AIS 32': 1, 'AIS 35': 2, 'AIS 36': 3, 'AIS 37': 1, 'AIS 38': 1, 'AIS 39': 1, 'AIS 41': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'SLC21 Post-Quantum Edition Se-curity Target”, Version 1.2, 2024-10-14, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-12-04, “EVALUATION TECHNICAL REPORT SUMMARY (ETR': 1, ' TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'Evaluation (ETR COMP) for the IFX_CCI_000068h, IFX_CCI_000080h G12”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.1, 2024-10-22 (confidential document) [12] (also': 1, "Security Controller – V24), Hardware Reference Manual”, v6.0, 2024-06-26, Infineon Technologies AG (confidential document) [13] (also [AGD_PRM]), “TEGRION™ SLx2 security con-troller family, Programmer's Reference Manual": 1, ' v1.4.0, 2024-05-22, Infineon Technologies AG (confidential document) [14] (also [AGD_SG]), “SLC21, 32-bit Security Controller – V24, Security Guidelines”, v1.00-3001': 1, 'Infineon Technologies AG (confidential document) [15] (also [AGD_PPM]), “SLC21 (32-bit Security Controller – V24), Production and personalization': 1, 'Flash Loader V10”, v10.01, 2023-06-28, Infineon Technologies AG (confidential document) [16] (also [AGD_CryptoUM]), “Crypto2304T V4, User Manual”, v3.0, 2024-06-21, Infineon Technologies': 1, 'confidential document) [17] (also [AGD_CS]), “CS-SLC21V24 CryptoSuite 32-bit Security Controller, User inter- face manual': 1, 'v5.00.012, 2024-08-27, Infineon Technologies AG (confidential document) 7 See section 9.1 on usage of specific AIS. 27 / 31 Certification Report BSI-DSZ-CC-1249-2024 [18': 1, '32-bit Secu-rity Controller – V24) Errata sheet”, v3.0, 2024-01-09, Infineon Technologies AG (confidential document) [19] “Site Technical Audit Report (STAR) - Infineon Technologies AG, Munich”, Version 4': 1, 'TÜV Informationstechnik GmbH (confidential document) [20] “Site Technical Audit Report (STAR) - Infineon Technologies Asia Pacific Pte Ltd., Singapore': 1, 'Version 3, 2024-11-14, TÜV Informationstechnik GmbH (confidential document) 28 / 31 BSI-DSZ-CC-1249-2024 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 3, 'EAL 6': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 4, 'ADV_FSP.4': 2, 'ADV_IMP.2': 2, 'ADV_IMP.1': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 4, 'ALC_CMC.5': 3, 'ALC_CMC.4': 1, 'ALC_CMS.5': 3, 'ALC_CMS.4': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_INT': 9, 'ASE_CCL': 3, 'ASE_SPD': 4, 'ASE_OBJ': 4, 'ASE_ECD': 3, 'ASE_REQ': 26, 'ASE_TSS': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 26, 'FCS_COP': 19, 'FCS_CKM.4': 13, 'FCS_CKM': 9, 'FCS_RNG.1': 11, 'FCS_CKM.1': 8, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 2}, 'FDP': {'FDP_SDC.1': 5, 'FDP_SDI.2': 3, 'FDP_ACC': 15, 'FDP_ACF': 14, 'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 6, 'FDP_IFC.1': 8, 'FDP_ACC.1': 6, 'FDP_ACF.1': 12, 'FDP_ACC.2': 1, 'FDP_UCT.1': 3, 'FDP_UIT.1': 3}, 'FIA': {'FIA_API.1': 5, 'FIA_UID': 8, 'FIA_UID.1': 5, 'FIA_API.1.1': 1, 'FIA_API': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA': 21, 'FMT_SMF': 19, 'FMT_SMR': 14, 'FMT_LIM': 8, 'FMT_MTD': 9, 'FMT_LIM.1': 5, 'FMT_LIM.2': 5, 'FMT_MSA.3': 5, 'FMT_MSA.1': 4, 'FMT_SMR.1': 11, 'FMT_SMF.1': 5, 'FMT_MTD.1': 1}, 'FPT': {'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS.1': 8, 'FPT_PHP.3': 11, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.MLKEM': 4, 'O.RND': 3, 'O.AES': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon': 4, 'Infineon Technologies AG': 9, 'Infineon Technologies': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16, 'AES128': 3}}, 'miscellaneous': {'SM4': {'SM4': 1}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 4}, 'SHA3': {'SHA-3': 3, 'SHA3': 1, 'SHA3-224': 1, 'SHA3-256': 1, 'SHA3-384': 1, 'SHA3-512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 4, 'RNG': 41}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CCM': {'CCM': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'Physical Probing': 2, 'physical probing': 1, 'side-channel': 5, 'side channel': 1}, 'FI': {'Malfunction': 2}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 202': 6, 'FIPS 203': 9, 'FIPS PUB 197': 1}, 'NIST': {'SP 800-38A': 3, 'SP 800-22': 3, 'SP 800-38C': 3, 'SP 800-108': 3, 'SP 800-38B': 3, 'SP 800-90A': 4}, 'BSI': {'AIS 31': 10, 'AIS 46': 3, 'AIS 20': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1249-2024': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1249a_pdf.pdf
. - The st_filename property was set to
1249b_pdf.pdf
. - The cert_filename property was set to
1249c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1249-2024
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}]}
values added.
- The report property was updated, with the
-
27.01.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1249c_pdf.pdf",
"dgst": "5e551e06e7b71400",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1249-2024",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"04.05.0040",
"02.01.0040",
"5.00.012",
"80.505.04.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"cf0f01bcd7be3e9c"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Smart Cards and similar devices",
"cert_id": "BSI-DSZ-CC-1249-2024",
"certification_date": "2024-12-17",
"enhanced": {
"applicant": "Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg",
"assurance_level": "EAL6+,ALC_FLR.1",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249c_pdf.pdf?__blob=publicationFile\u0026v=3",
"certification_date": "2024-12-17",
"description": "The TOE is a SmartCard based on a 32-bit Arm v8-M CPU architecture, including documentation and software support libraries with PQC functionality (post quantum cryptography).",
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2029-12-16",
"product": "IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents",
"protection_profile": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249a_pdf.pdf?__blob=publicationFile\u0026v=3",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1249b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, \u2026",
"subcategory": "ICs, Cryptolib",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1249.html",
"vendor": "Infineon Technologies AG"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents",
"not_valid_after": "2029-12-17",
"not_valid_before": "2024-12-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1249c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1249-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1,
"EAL 6": 1,
"EAL 6 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum",
"/Title": "Certificate BSI-DSZ-CC-1249-2024",
"pdf_file_size_bytes": 231007,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1249a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 16 December 2029 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1249-2024",
"cert_item": "IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1249-2024": 18
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-": 1,
"BSI-CC-PP-0084-2014": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 3
},
"AGD": {
"AGD_HRM": 4,
"AGD_PPM": 5,
"AGD_PRM": 6
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ATE": {
"ATE_FUN": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 1,
"EAL 5": 4,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL5+": 1,
"EAL6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ITC": 1
}
},
"certification_process": {
"ConfidentialDocument": {
" T\u00dcV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
" v1.4.0, 2024-05-22, Infineon Technologies AG (confidential document) [14] (also [AGD_SG]), \u201cSLC21, 32-bit Security Controller \u2013 V24, Security Guidelines\u201d, v1.00-3001": 1,
"32-bit Secu-rity Controller \u2013 V24) Errata sheet\u201d, v3.0, 2024-01-09, Infineon Technologies AG (confidential document) [19] \u201cSite Technical Audit Report (STAR) - Infineon Technologies AG, Munich\u201d, Version 4": 1,
"Evaluation (ETR COMP) for the IFX_CCI_000068h, IFX_CCI_000080h G12\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.1, 2024-10-22 (confidential document) [12] (also": 1,
"Flash Loader V10\u201d, v10.01, 2023-06-28, Infineon Technologies AG (confidential document) [16] (also [AGD_CryptoUM]), \u201cCrypto2304T V4, User Manual\u201d, v3.0, 2024-06-21, Infineon Technologies": 1,
"Infineon Technologies AG (confidential document) [15] (also [AGD_PPM]), \u201cSLC21 (32-bit Security Controller \u2013 V24), Production and personalization": 1,
"SLC21 Post-Quantum Edition Se-curity Target\u201d, Version 1.2, 2024-10-14, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-12-04, \u201cEVALUATION TECHNICAL REPORT SUMMARY (ETR": 1,
"Security Controller \u2013 V24), Hardware Reference Manual\u201d, v6.0, 2024-06-26, Infineon Technologies AG (confidential document) [13] (also [AGD_PRM]), \u201cTEGRION\u2122 SLx2 security con-troller family, Programmer\u0027s Reference Manual": 1,
"T\u00dcV Informationstechnik GmbH (confidential document) [20] \u201cSite Technical Audit Report (STAR) - Infineon Technologies Asia Pacific Pte Ltd., Singapore": 1,
"Version 3, 2024-11-14, T\u00dcV Informationstechnik GmbH (confidential document) 28 / 31 BSI-DSZ-CC-1249-2024 Certification Report C. Excerpts from the Criteria For the meaning": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [17] (also [AGD_CS]), \u201cCS-SLC21V24 CryptoSuite 32-bit Security Controller, User inter- face manual": 1,
"v5.00.012, 2024-08-27, Infineon Technologies AG (confidential document) 7 See section 9.1 on usage of specific AIS. 27 / 31 Certification Report BSI-DSZ-CC-1249-2024 [18": 1
}
},
"cipher_mode": {
"CCM": {
"CCM": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 6
}
},
"hash_function": {
"SHA": {
"SHA3": {
"SHA-3": 1,
"SHA3-224": 1,
"SHA3-384": 1,
"SHA3-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {
"FIPS": {
"ML-KEM": 6
}
},
"randomness": {
"RNG": {
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 1,
"AIS 23": 1,
"AIS 25": 1,
"AIS 26": 1,
"AIS 27": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 1,
"AIS 38": 1,
"AIS 39": 1,
"AIS 41": 1,
"AIS 46": 1,
"AIS 47": 1
},
"FIPS": {
"FIPS 197": 1,
"FIPS 203": 1,
"FIPS PUB 203": 1,
"FIPS197": 3,
"FIPS202": 3,
"FIPS203": 5
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7,
"AES-": 7
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies": 1,
"Infineon Technologies AG": 15
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, Security IC, PQC, Post Quantum",
"/Title": "Certification Report BSI-DSZ-CC-1249-2024",
"pdf_file_size_bytes": 408251,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/cc/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"st_filename": "1249b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 1,
"O.MLKEM": 4,
"O.RND": 3
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 2,
"ADV_FSP.5": 4,
"ADV_IMP.1": 1,
"ADV_IMP.2": 2,
"ADV_INT.3": 1,
"ADV_SPM.1": 2,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMC.5": 3,
"ALC_CMS.4": 2,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 4,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL": 3,
"ASE_CCL.1": 1,
"ASE_ECD": 3,
"ASE_ECD.1": 1,
"ASE_INT": 9,
"ASE_INT.1": 1,
"ASE_OBJ": 4,
"ASE_OBJ.2": 1,
"ASE_REQ": 26,
"ASE_REQ.2": 1,
"ASE_SPD": 4,
"ASE_SPD.1": 1,
"ASE_TSS": 6,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_COV.3": 2,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL6": 3,
"EAL6 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 5,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 8,
"FCS_CKM.2": 2,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP": 19,
"FCS_COP.1": 2,
"FCS_RNG": 26,
"FCS_RNG.1": 11
},
"FDP": {
"FDP_ACC": 15,
"FDP_ACC.1": 6,
"FDP_ACC.2": 1,
"FDP_ACF": 14,
"FDP_ACF.1": 12,
"FDP_IFC.1": 8,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_ITT.1": 6,
"FDP_SDC.1": 5,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 3,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 3,
"FDP_UIT.1": 3
},
"FIA": {
"FIA_API": 1,
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_UID": 8,
"FIA_UID.1": 5,
"FIA_UID.2": 1
},
"FMT": {
"FMT_LIM": 8,
"FMT_LIM.1": 5,
"FMT_LIM.2": 5,
"FMT_MSA": 21,
"FMT_MSA.1": 4,
"FMT_MSA.3": 5,
"FMT_MTD": 9,
"FMT_MTD.1": 1,
"FMT_SMF": 19,
"FMT_SMF.1": 5,
"FMT_SMR": 14,
"FMT_SMR.1": 11
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_ITT.1": 6,
"FPT_PHP.3": 11,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 4
},
"FTP": {
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 3
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 4
},
"SHA3": {
"SHA-3": 3,
"SHA3": 1,
"SHA3-224": 1,
"SHA3-256": 1,
"SHA3-384": 1,
"SHA3-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 41
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2
},
"SCA": {
"Leak-Inherent": 2,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"side-channel": 5
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 3,
"AIS 31": 10,
"AIS 46": 3
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 197": 5,
"FIPS 202": 6,
"FIPS 203": 9,
"FIPS PUB 197": 1
},
"NIST": {
"SP 800-108": 3,
"SP 800-22": 3,
"SP 800-38A": 3,
"SP 800-38B": 3,
"SP 800-38C": 3,
"SP 800-90A": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16,
"AES128": 3
}
},
"constructions": {
"MAC": {
"CMAC": 2
}
},
"miscellaneous": {
"SM4": {
"SM4": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 4,
"Infineon Technologies": 7,
"Infineon Technologies AG": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Keywords": "Infineon",
"/Subject": "Infineon,",
"/Title": "IFX_CCI_00068h Security Target",
"pdf_file_size_bytes": 1099527,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.infineon.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1249a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1249b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "eaf7402d19aa467f6c1a697e7445de04562ce644a0c9d43d719cc81135746b15",
"txt_hash": "87caa230edeec27c328f5920aca2aaa495f92cbdc4cedd25222a452fd60e3d45"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cc149d30580a603fe02ac651335d068674f95b5672d8eee90f515a58d5761843",
"txt_hash": "e15a51df055d66c8d115cae279f1792c5a1c204291b25496800c229e78b4a4b6"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "410c34b27f0f45b9498af012353824efd72b5043e3b9cd396d9a7c092e118660",
"txt_hash": "66bb981b3dc9c388eda6a0e81b858cfe55ac9845f15a93a3fa50c6ea7ea93069"
}
},
"status": "active"
}