IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with firmware version80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and userguidance documents

CSV information

Status active
Valid from 01.10.2025
Valid until 01.10.2030
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-1252-V2-2025

Certificate

Extracted keywords

Vendor
Infineon Technologies AG

Security level
EAL 6, EAL 5, EAL 4, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ATE_SDP.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1252-V2-2025

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-1252-V2-2025
Subject Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025
Keywords "Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025"
Author Federal Office for Information Security
Pages 1

Certification report

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-256, TDES, TDEA, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC, Diffie-Hellman, DSA
Post-quantum Algorithms
ML-KEM, ML-DSA, PQC
Hash functions
SHA-1, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC, Key Exchange
Protocols
PACE
Randomness
RNG
Elliptic Curves
secp160k1, secp160r1, secp160r2, secp256k1, Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, GCM, CCM

JavaCard API constants
FRP256V1, X25519, X448
Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
EAL 6, EAL 5, EAL 4, EAL 2, EAL 1, EAL5+, EAL6, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_ARC, AGD_HRM, AGD_PRM, AGD_PPM, ALC_FLR.1, ALC_FLR, ALC_DVS, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_SDP.1, AVA_VAN.5
Security Functional Requirements (SFR)
FCS_RNG
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0084-
Certificates
BSI-DSZ-CC-1252-V2-2025, BSI-DSZ-CC-1252-2025, CC-1252-2025
Evaluation facilities
TĂśV Informationstechnik

Side-channel analysis
physical probing, physical tampering
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 3, 2025-09-30, “EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik, (confidential document) [7] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, G12 with optional Crypto Suite, Security Target”, Infineon Technologies AG (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product, Version 3, 2025- 09-30, IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with optional Crypto Suite”, TÜV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 0.2, 2025-05-15 (confidential document) [11] also, Controller – V32), Hardware Reference Manual”, Version 5.0, 2025-02-26, Infineon Technologies AG (confidential document) [12] also referred to as [AGD_PRM], “TEGRION™ SLx2 security controller family Programmer’s, Manual SLx2_DFP”, Version 1.8.0, 2025-05-09, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_SG], “SLC27, 32-bit Security Controller – V32, Security Guidelines, 1.00-3087, 2025-05-28, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_PPM], “TEGRION SLC27 (32-bit Security Controller – V32), Production, personalization manual”, Version 10.08, 2025-05-07, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_CryptoUM], “Crypto2304T V4, User Manual”, Version 3.0, 2024-06-21, Technologies AG (confidential document) [16] also referred to as [AGD_ES], “TEGRION™ SLC27 (32-bit Security Controller – V32), Errata, Version 6.0, 2025-05-22, Infineon Technologies AG (confidential document) [17] “SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance, Version 1, 2025-08-19, TÜV Informationstechnik GmbH (confidential document) [18] also referred to as [AGD_CS], “CS-SLC27V32 CryptoSuite, 32-bit Security Controller, User, manual”, Version 5.02.002, 2025-05-28, Infineon Technologies AG (confidential document) [19] “Site Technical Audit Report (STAR) Infineon Technologies GmbH & Co. KG, Dresden”, version 1, TÜV Informationstechnik GmbH (confidential document) 43 / 47 Certification Report BSI-DSZ-CC-1252-V2-2025 C. Excerpts from the Criteria For the

Standards
FIPS197, FIPS186-5, FIPS180-4, FIPS202, FIPS198-1, FIPS203, FIPS204, FIPS PUB 198-1, FIPS PUB 202, PKCS#1, AIS31, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 23, AIS 25, AIS 26, AIS 31, AIS 32, AIS 35, AIS 36, AIS 37, AIS 38, AIS 39, AIS 41, AIS 46, AIS 47, RFC5114, RFC7748, RFC5639, RFC 5114, RFC 5639, RFC 7748, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14888-3, ICAO
Technical reports
BSI TR-02102, BSI TR-03111

File metadata

Title Certification Report BSI-DSZ-CC-1252-V2-2025
Subject Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025
Keywords "Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025"
Author Federal Office for Information Security
Pages 47

Frontpage

Certificate ID BSI-DSZ-CC-1252-V2-2025
Certified item IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with firmware version 80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and user guidance documents
Certification lab BSI
Developer Infineon Technologies AG

References

Outgoing
  • BSI-DSZ-CC-1252-2025 - active - IFX_CCI_00007Ch/88h/89h/8Ah G12 with firmware version 80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and user guidance documents

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA1, SHA256, SHA384, SHA512, SHA-224, SHA-384, SHA-512, SHA-2, SHA2, SHA-3, SHA3, SHA3-224, SHA3-384, SHA3-512, SHA3-245, SHAKE128, SHAKE256
Schemes
MAC, Key Exchange, Key agreement
Protocols
PACE, IKE
Randomness
RND, RNG
Elliptic Curves
secp256k1, secp160k1, secp160r1, secp160r2, Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, GCM, CCM

JavaCard API constants
FRP256V1, X25519, X448
Trusted Execution Environments
SE
Vendor
Infineon, Infineon Technologies AG, Infineon Technologies

Security level
EAL6, EAL 6, EAL6 augmented
Claims
O.AES, O.TDES, O.HMAC, O.FFC, O.RSA, O.ECC, O.ML, O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_COMP.1, ADV_TDS.4, ADV_ARC.1, ADV_IMP.1, ADV_FSP.5, ADV_FSP.4, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_TAT, ALC_CMC.5, ALC_CMC.4, ALC_CMS.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_SDP.1, ATE_SDP, ATE_FUN, ATE_SPD.1, ATE_COV.3, ATE_COV.2, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN, AVA_VAN.5, AVA_TDS.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.6, FCS_CKM.5, FCS_CKM.2, FCS_COP.1, FCS_CKM.1, FCS_RNG.1, FCS_CKM.6.1, FCS_RBG.1, FDP_ITT, FDP_IFC, FDP_SDC.1, FDP_SDI.2, FDP_ACC, FDP_ACF, FDP_SDC, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ACF.1, FDP_ACC.2, FDP_UCT.1, FDP_UIT.1, FDP_SDP.1.2, FIA_API.1, FIA_UID, FIA_API, FIA_UID.1, FIA_API.1.1, FIA_UID.2, FMT_LIM.1, FMT_LIM.2, FMT_MSA, FMT_SMF, FMT_SMR, FMT_LIM, FMT_MTD, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MTD.1, FPT_SDP, FPT_SDP.1, FPT_ITT, FPT_FLS, FPT_PHP, FPT_FLS.1, FPT_SDP.1.1, FPT_SDP.1.2, FPT_SDP.1.3, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_PHP.3, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0084-2014

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side-channel, side channel, Malfunction, malfunction, fault injection, JIL

Standards
FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-5, FIPS 203, FIPS 204, FIPS 202, FIPS PUB 197, FIPS PUB 198-1, SP 800-38A, SP 800-67, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-56A, SP 800-56B, SP 800-186, SP 800-22, SP 800-108, SP 800-90A, NIST SP 800-186, NIST SP 800-38D, NIST SP 800-67, PKCS#1, AIS 31, AIS 46, AIS 20, RFC 5114, RFC 7748, RFC 5639, RFC 3526, ICAO
Technical reports
BSI TR-03111

File metadata

Title IFX_CCI_00068h Security Target
Keywords Infineon
Author Urian Rainer (IFAG DSS SQM PS CERT)
Pages 80

Heuristics

Certificate ID: BSI-DSZ-CC-1252-V2-2025

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_SDP.1, ATE_SPD.1, AVA_TDS.4, AVA_VAN.5

Similar certificates

Name Certificate ID
IFX_CCI_00007Ch/88h/89h/8Ah G12 with firmware version 80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and user guidance documents BSI-DSZ-CC-1252-2025 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1 & 80.312.02.0, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.34.000 and v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V4-2023 Compare
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1107-V5-2024 Compare
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1156-V3-2022 Compare
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1156-V2-2021 Compare
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 and 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and 3.35.001 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1156-V4-2024 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 with firmware 80.306.16.0 & 80.306.16.1 & 80.312.02.0, optional NRG™ SW 05.03.4097, opt.HSL v3.52.9708, UMSLC lib v01.30.0564, opt. SCL v2.15.000 and v2.11.003, opt. ACL v3.02.000 and v3.33.003 and v3.34.000 and 3.35.001, opt. RCL v.1.10.007, opt. HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V6-2025 Compare
IFX_CCI_000068h/80h/97h/99h G12 and IFX_CCI_000093h R11/R12 with firmware v80.505.04.1 or v80.511.00.0, opt.HSL v04.05.0040, opt.UMSLC v02.01.0040, opt.Crypto Suite v.05.02.002, opt. NRG™ v06.10.0002 or v06.10.0005, opt.Ascon-128 MISE v1.1.2, opt.SHA256 MISE v1.1.1 and user guidance documents BSI-DSZ-CC-1206-V5-2025 Compare
IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional CryptoSuite v04.08.001, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002 or 06.10.0005, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents BSI-DSZ-CC-1206-V4-2025 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V3-2022 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1107-V2-2021 Compare
IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware version 80.505.04.1, optional PQ Crypto Suite v5.00.012, optional HSL v04.05.0040, optional UMSLC v02.01.0040 and user guidance documents BSI-DSZ-CC-1249-2024 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
IFX_CCI_00007Dh, IFX_CCI_00007Eh, IFX_CCI_00007Fh, design step H11 with firmware v80.506.04.1, optional HSL v04.05.0030, optional UMSLC v02.01.0040, optional Crypto Suites v4.06.002, optional Crypto Suites v4.08.001 BSI-DSZ-CC-1229-V3-2025 Compare
IFX_CCI_00006A, IFX_CCI_00006Bh, IFX_CCI_00006Ch design step S12 with firmware 80.311.04.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib 01.30.0695, optional SCL v2.15.000, optional ACL v3.34.000, optional RCL v1.10.007, optional HCL v1.13.002 and userguidance BSI-DSZ-CC-1205-2023 Compare
Infineon Security Controller IFX_CCI_00007Dh, IFX_CCI_00007Eh, IFX_CCI_00007Fh, design step H11 with firmware version 80.506.04.1, optional CryptoSuite version 4.06.002, optional HSL version 04.05.0030, optional UMSLC version 02.01.0040, optional NRG™ version 06.10.0003 and user guidance documents BSI-DSZ-CC-1229-2024 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
IFX_CCI_000068h, 000077h, 000080h design step G12 with firmware version 80.505.04.1, optional HSL version 04.05.0040, optional UMSLC version 02.01.0040, optional NRG™ version 06.10.0002 and user guidance documents BSI-DSZ-CC-1206-2023 Compare
Showing 5 out of 20.

References

Loading...

Updates

  • 03.11.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with firmware version80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and userguidance documents was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1252V2c_pdf.pdf",
  "dgst": "3a6733b200feae7f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1252-V2-2025",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_SDP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_TDS",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "80.512.03.1",
        "5.02.002",
        "80.512.03.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "cf0f01bcd7be3e9c"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1252-2025"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1252-2025"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with firmware version80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and userguidance documents",
  "not_valid_after": "2030-10-01",
  "not_valid_before": "2025-10-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1252V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1252-V2-2025": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        },
        "ATE": {
          "ATE_SDP.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025",
      "/Title": "Certification Report BSI-DSZ-CC-1252-V2-2025",
      "pdf_file_size_bytes": 235225,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1252V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 extended EAL 6 augmented by ALC_FLR.1 and ATE_SDP.1 valid until: 30 September 2030",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1252-V2-2025",
        "cert_item": "IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with firmware version 80.512.03.0 or 80.512.03.1, optional Crypto Suite 5.02.002 and user guidance documents",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 6
          },
          "EdDSA": {
            "EdDSA": 5
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1252-2025": 3,
          "BSI-DSZ-CC-1252-V2-2025": 24
        },
        "NL": {
          "CC-1252-2025": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-": 1,
          "BSI-CC-PP-0084-2014": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 3
        },
        "AGD": {
          "AGD_HRM": 4,
          "AGD_PPM": 7,
          "AGD_PRM": 6
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ATE": {
          "ATE_SDP.1": 4
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 2,
          "EAL 5": 4,
          "EAL 6": 4,
          "EAL 6 augmented": 3,
          "EAL5+": 1,
          "EAL6": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_RNG": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          " Version 1, 2025-08-19, T\u00dcV Informationstechnik GmbH (confidential document) [18] also referred to as [AGD_CS], \u201cCS-SLC27V32 CryptoSuite, 32-bit Security Controller, User": 1,
          " Version 6.0, 2025-05-22, Infineon Technologies AG (confidential document) [17] \u201cSINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance": 1,
          "1.00-3087, 2025-05-28, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_PPM], \u201cTEGRION SLC27 (32-bit Security Controller \u2013 V32), Production": 1,
          "3, 2025-09-30, \u201cEVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)\u201d, T\u00dcV Informationstechnik, (confidential document) [7] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "Controller \u2013 V32), Hardware Reference Manual\u201d, Version 5.0, 2025-02-26, Infineon Technologies AG (confidential document) [12] also referred to as [AGD_PRM], \u201cTEGRION\u2122 SLx2 security controller family Programmer\u2019s": 1,
          "G12 with optional Crypto Suite, Security Target\u201d, Infineon Technologies AG (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product, Version 3, 2025- 09-30": 1,
          "IFX_CCI_00007Ch/88h/89h/8Ah/8Bh G12 with optional Crypto Suite\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 0.2, 2025-05-15 (confidential document) [11] also": 1,
          "Manual SLx2_DFP\u201d, Version 1.8.0, 2025-05-09, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_SG], \u201cSLC27, 32-bit Security Controller \u2013 V32, Security Guidelines": 1,
          "Technologies AG (confidential document) [16] also referred to as [AGD_ES], \u201cTEGRION\u2122 SLC27 (32-bit Security Controller \u2013 V32), Errata": 1,
          "T\u00dcV Informationstechnik GmbH (confidential document) 43 / 47 Certification Report BSI-DSZ-CC-1252-V2-2025 C. Excerpts from the Criteria For the": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "manual\u201d, Version 5.02.002, 2025-05-28, Infineon Technologies AG (confidential document) [19] \u201cSite Technical Audit Report (STAR) Infineon Technologies GmbH \u0026 Co. KG, Dresden\u201d, version 1": 1,
          "personalization manual\u201d, Version 10.08, 2025-05-07, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_CryptoUM], \u201cCrypto2304T V4, User Manual\u201d, Version 3.0, 2024-06-21": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 7
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Curve": {
          "Curve25519": 2
        },
        "Edwards": {
          "Ed25519": 1,
          "Ed448": 1
        },
        "NIST": {
          "secp160k1": 1,
          "secp160r1": 1,
          "secp160r2": 1,
          "secp256k1": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 6
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 1
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3-224": 1,
            "SHA3-256": 1,
            "SHA3-384": 1,
            "SHA3-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "FRP256V1": 1,
          "X25519": 2,
          "X448": 2
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "FIPS": {
          "ML-DSA": 5,
          "ML-KEM": 6
        },
        "PQC": {
          "PQC": 1
        }
      },
      "randomness": {
        "RNG": {
          "RNG": 17
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 1,
          "AIS 23": 1,
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS 39": 1,
          "AIS 41": 1,
          "AIS 46": 1,
          "AIS 47": 1,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS PUB 198-1": 1,
          "FIPS PUB 202": 1,
          "FIPS180-4": 3,
          "FIPS186-5": 13,
          "FIPS197": 4,
          "FIPS198-1": 2,
          "FIPS202": 3,
          "FIPS203": 4,
          "FIPS204": 4
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5114": 1,
          "RFC 5639": 1,
          "RFC 7748": 1,
          "RFC5114": 2,
          "RFC5639": 3,
          "RFC7748": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10,
            "AES-128": 5,
            "AES-256": 3
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 4,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102": 1,
          "BSI TR-03111": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 5,
          "Infineon Technologies": 2,
          "Infineon Technologies AG": 15
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Infineon, Smartcard, PP-0084, BSI-DSZ-CC-1252-V2-2025",
      "/Title": "Certification Report BSI-DSZ-CC-1252-V2-2025",
      "pdf_file_size_bytes": 541918,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.commoncriteriaportal.org/cc/index.cfm",
          "https://www.iso.org/standard/72892.html",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.iso.org/standard/72913.html",
          "https://www.bsi.bund.de/AIS",
          "https://www.sogis.eu/",
          "https://www.iso.org/standard/72917.html",
          "https://standards.iso.org/ittf/PubliclyAvailableStandards/index.html",
          "https://www.bsi.bund.de/",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten",
          "https://www.iso.org/standard/72906.html",
          "https://www.iso.org/standard/72891.html",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    },
    "st_filename": "1252V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 20
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 7
          },
          "EdDSA": {
            "EdDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AES": 3,
          "O.ECC": 5,
          "O.FFC": 5,
          "O.HMAC": 5,
          "O.ML": 5,
          "O.RND": 3,
          "O.RSA": 5,
          "O.TDES": 3
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_COMP.1": 1,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 4,
          "ADV_IMP.1": 3,
          "ADV_IMP.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 3,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL": 5,
          "ASE_CCL.1": 1,
          "ASE_ECD": 6,
          "ASE_ECD.1": 1,
          "ASE_INT": 12,
          "ASE_INT.1": 1,
          "ASE_OBJ": 5,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 41,
          "ASE_REQ.2": 1,
          "ASE_SPD": 4,
          "ASE_SPD.1": 1,
          "ASE_TSS": 6,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_COV.3": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN": 2,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1,
          "ATE_SDP": 8,
          "ATE_SDP.1": 36,
          "ATE_SPD.1": 1
        },
        "AVA": {
          "AVA_TDS.4": 1,
          "AVA_VAN": 4,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 2,
          "EAL6": 3,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 51,
          "FCS_CKM.1": 32,
          "FCS_CKM.2": 10,
          "FCS_CKM.4": 2,
          "FCS_CKM.5": 39,
          "FCS_CKM.6": 40,
          "FCS_CKM.6.1": 4,
          "FCS_COP": 64,
          "FCS_COP.1": 9,
          "FCS_RBG.1": 9,
          "FCS_RNG": 36,
          "FCS_RNG.1": 19
        },
        "FDP": {
          "FDP_ACC": 18,
          "FDP_ACC.1": 9,
          "FDP_ACC.2": 1,
          "FDP_ACF": 19,
          "FDP_ACF.1": 12,
          "FDP_IFC": 10,
          "FDP_IFC.1": 9,
          "FDP_IFF.1": 4,
          "FDP_ITC.1": 30,
          "FDP_ITC.2": 30,
          "FDP_ITT": 6,
          "FDP_ITT.1": 4,
          "FDP_SDC": 1,
          "FDP_SDC.1": 3,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_SDP.1.2": 1,
          "FDP_UCT.1": 6,
          "FDP_UIT.1": 6
        },
        "FIA": {
          "FIA_API": 2,
          "FIA_API.1": 5,
          "FIA_API.1.1": 1,
          "FIA_UID": 8,
          "FIA_UID.1": 5,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_LIM": 13,
          "FMT_LIM.1": 11,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 9,
          "FMT_LIM.2.1": 1,
          "FMT_MSA": 22,
          "FMT_MSA.1": 4,
          "FMT_MSA.3": 6,
          "FMT_MTD": 11,
          "FMT_MTD.1": 1,
          "FMT_SMF": 16,
          "FMT_SMF.1": 4,
          "FMT_SMR": 17,
          "FMT_SMR.1": 10
        },
        "FPT": {
          "FPT_FLS": 8,
          "FPT_FLS.1": 9,
          "FPT_ITT": 6,
          "FPT_ITT.1": 5,
          "FPT_PHP": 1,
          "FPT_PHP.3": 10,
          "FPT_SDP": 3,
          "FPT_SDP.1": 11,
          "FPT_SDP.1.1": 2,
          "FPT_SDP.1.2": 2,
          "FPT_SDP.1.3": 2,
          "FPT_TST.1": 4,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 3
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 10
        },
        "CCM": {
          "CCM": 7
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 15
        },
        "GCM": {
          "GCM": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 5
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 13
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Curve": {
          "Curve25519": 1
        },
        "Edwards": {
          "Ed25519": 1,
          "Ed448": 1
        },
        "NIST": {
          "secp160k1": 1,
          "secp160r1": 1,
          "secp160r2": 1,
          "secp256k1": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 3,
            "SHA-224": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA2": 1,
            "SHA256": 7,
            "SHA384": 2,
            "SHA512": 2
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3": 1,
            "SHA3-224": 2,
            "SHA3-245": 1,
            "SHA3-384": 1,
            "SHA3-512": 2
          }
        },
        "SHAKE": {
          "SHAKE128": 2,
          "SHAKE256": 2
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "FRP256V1": 2,
          "X25519": 4,
          "X448": 4
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 41
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "fault injection": 13,
          "malfunction": 1
        },
        "SCA": {
          "Leak-Inherent": 3,
          "Physical Probing": 2,
          "physical probing": 1,
          "side channel": 2,
          "side-channel": 5
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 4,
          "AIS 31": 11,
          "AIS 46": 3
        },
        "FIPS": {
          "FIPS 180-4": 7,
          "FIPS 186-5": 32,
          "FIPS 197": 14,
          "FIPS 198-1": 3,
          "FIPS 202": 5,
          "FIPS 203": 8,
          "FIPS 204": 8,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1
        },
        "ICAO": {
          "ICAO": 4
        },
        "NIST": {
          "NIST SP 800-186": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-67": 1,
          "SP 800-108": 3,
          "SP 800-186": 3,
          "SP 800-22": 3,
          "SP 800-38A": 9,
          "SP 800-38B": 5,
          "SP 800-38C": 5,
          "SP 800-38D": 3,
          "SP 800-56A": 6,
          "SP 800-56B": 7,
          "SP 800-67": 9,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS#1": 18
        },
        "RFC": {
          "RFC 3526": 2,
          "RFC 5114": 5,
          "RFC 5639": 3,
          "RFC 7748": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 37
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 20,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 5,
            "CMAC": 6,
            "HMAC": 14
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 5,
          "Infineon Technologies": 7,
          "Infineon Technologies AG": 8
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Urian Rainer (IFAG DSS SQM PS CERT)",
      "/Keywords": "Infineon",
      "/Title": "IFX_CCI_00068h Security Target",
      "pdf_file_size_bytes": 1674784,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.infineon.com/",
          "https://rqmprod.intra.infineon.com/perspective.req?projectId=945\u0026docId=6833904",
          "https://rqmprod.intra.infineon.com/perspective.req?projectId=945\u0026docId=6914287",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 80
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1252V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1252V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0262355724438b8d9cecb4bffeb109502d44dcab45fe0656b7ae67c77f3db254",
      "txt_hash": "833cf1ec11cdecbf97c57e3897b36f0505fc8c3eed278450b00a1fc60bb4bf77"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0586bdef5355b927e50704f19186956e3013fffb58b1d475725c221b6150ee56",
      "txt_hash": "c708e3935789d525b7f89283fd7e5490398d626c3b810682e59c6f7fe02c2885"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "09a134825ac369606b1069a2a8183a1f83debdb375fb759482a7c9d37651826f",
      "txt_hash": "9f732204b583d010169cfe3709fdb0fab3f74c132b287677d500e85fa52e97e6"
    }
  },
  "status": "active"
}