Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 05.09.2017
Valid until 04.09.2022
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0782-V3-2017

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, 3DES
Asymmetric Algorithms
RSA2048, RSA4096, RSA-2048, ECDH, ECDSA, ECC
Hash functions
SHA-2
Randomness
TRNG, PRNG, RNG
Libraries
v1.02.013

Trusted Execution Environments
SSC
Vendor
Infineon, Infineon Technologies AG, Infineon Technologies, G&D, Giesecke & Devrient

Security level
EAL 6, EAL 5, EAL 4, EAL 1, EAL 2, EAL6, EAL6+, EAL5+, EAL 3, EAL 7, EAL 6 augmented, EAL6 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP- 0035-2007
Certificates
BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V2-, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-S-0087-2017
Evaluation facilities
TĂśV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, “Evaluation, Report – ETR (Summary)”, Tüv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8, “Evaluation Technical Report for composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC, Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface, Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20, Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family, 70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller, Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference, Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01, Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21, 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26

Side-channel analysis
physical probing, SPA, DPA, physical tampering, DFA
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, “Evaluation, Report – ETR (Summary)”, Tüv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8, “Evaluation Technical Report for composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC, Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface, Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20, Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family, 70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller, Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference, Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01, Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21, 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26

Standards
AIS 34, AIS 31, AIS 25, AIS 26, AIS 36, AIS 35, AIS1, AIS14, AIS19, AIS20, AIS25, AIS26, AIS31, AIS32, AIS34, AIS35, AIS36, AIS38, AIS46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0782-V3-2017
Subject: Common Criteria Certification
Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, PP-0035, Security IC, Infineon Technologies AG"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20170918132154+02'00'
Modification date: D:20170918134446+02'00'
Pages: 40
Creator: Writer
Producer: LibreOffice 5.2

Frontpage

Certificate ID: BSI-DSZ-CC-0782-V3-2017
Certified item: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware
Certification lab: BSI
Developer: Infineon Technologies AG

References

Outgoing
  • BSI-DSZ-CC-0782-V2-2015 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Incoming
  • BSI-DSZ-CC-0987-2019 - Machine Readable Travel Document with „ICAO Application“, Basic Access Control based on National Operating System (NOS) NOS e-Passport (BAC) v.1.0-I
  • ANSSI-CC-2017/74 - IDeal Citiz v2.16-i on M7892 B11 - Java Card Open Platform
  • BSI-DSZ-CC-0985-2018 - Machine Readable e-Document with „ICAO Application”, Extended Access Control with PACE based on National Operating System (NOS) NOS e-Passport (EAC with PACE) v.1.01-I
  • BSI-DSZ-CC-0782-V4-2018 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC, CBC-MAC
Asymmetric Algorithms
RSA2048, RSA4096, RSA-2048, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-256, SHA-512, SHA-2
Schemes
Key Agreement
Randomness
TRNG, DTRNG, PRNG, RND, RNG
Libraries
v1.02.013
Block cipher modes
ECB, CBC, CTR, CFB

Vendor
Infineon Technologies AG, Infineon Technologies, Infineon

Security level
EAL6, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL 6 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_SPM, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_IMP, ADV_IMP.1, ADV_FSP, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_CMS, ALC_CMS.4, ALC_CMC, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, ATE_COV.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG, FCS_COP, FCS_CKM, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FMT_CKM.4, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_AMT.1, FPT_LIM.2, FRU_FLT.2
Protection profiles
BSI-PP-0035

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side-channel, side channel, SPA, DPA, Malfunction, DFA, fault induction

Standards
FIPS 197, FIPS 180-4, FIPS PUB 197, FIPS PUB 180-4, SP 800-67, SP 800-38A, AIS31, AIS32, RFC3447, RFC 5639, RFC 3447, ISO/IEC 18092, ISO/IEC 7816-3, ISO/IEC 15946-3, ISO/IEC 15946-2, ISO/IEC 10118, ISO/IEC 18033, ISO/IEC 15946-1, ISO/IEC 97971: 2011, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-02102, BSI 1

File metadata

Title: Security Target Lite
Subject: M7892 B11 Security Certification
Author: Dr. Oleg Rudakov
Creation date: D:20170922134010+02'00'
Modification date: D:20170922134010+02'00'
Pages: 98
Creator: Microsoft Word - M7892_B11_SCL_public_ST_20170802
Producer: Nuance PDF Create

References

Outgoing
Incoming
  • BSI-DSZ-CC-0987-2019 - Machine Readable Travel Document with „ICAO Application“, Basic Access Control based on National Operating System (NOS) NOS e-Passport (BAC) v.1.0-I
  • ANSSI-CC-2017/74 - IDeal Citiz v2.16-i on M7892 B11 - Java Card Open Platform
  • ANSSI-CC-2018/45 - IDeal Citiz v2.16-i embarquant l’application VITALE version 1.2.18
  • BSI-DSZ-CC-0985-2018 - Machine Readable e-Document with „ICAO Application”, Extended Access Control with PACE based on National Operating System (NOS) NOS e-Passport (EAC with PACE) v.1.01-I

Heuristics ?

Certificate ID: BSI-DSZ-CC-0782-V3-2017

Extracted SARs

ASE_TSS.1, AGD_PRE.1, ADV_INT.3, APE_REQ.2, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ALC_LCD.1, APE_INT.1, ASE_REQ.2, ATE_FUN.2, AGD_OPE.1, ASE_ECD.1, ATE_COV.3, ADV_SPM.1, APE_ECD.1, ALC_DEL.1, ATE_DPT.3, APE_OBJ.2, ALC_TAT.3, ATE_IND.2, ASE_SPD.1, ADV_IMP.2, ALC_CMS.5, ADV_TDS.5, ASE_CCL.1, APE_SPD.1, APE_CCL.1, ALC_DVS.2, ALC_FLR.1, ASE_OBJ.2, ASE_INT.1, ADV_ARC.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2017-15361
C M N
MEDIUM 5.9 3.6 16.10.2017 17:29

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '66c7e78f3656a24b9da4605c24b468f2a9d426aa54c486b0162316cd4283c25e', 'txt_hash': 'ff65edd28910a0e79be5126576d1731a2b2f869896e77bb71b02d6275c9bd89d'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cbb29a78748646e6003cc66f1f23416764937a74e88c0e5dc4af7ce4a7b335a4', 'txt_hash': '64b11213ba48cde0fac78c817e7d68d4fdf0439e9366308c683c436ed6e1d4d9'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0782-V3-2017', 'cert_item': 'Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 conformant extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-V2-': 1, 'BSI-DSZ-CC-S-0087-2017': 1}, '__update__': {'BSI-DSZ-CC-0782-V3-2017': 24, 'BSI-DSZ-CC-0782-V2-2015': 2}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-V3-2017': 48, 'BSI-DSZ-CC-0782-V2-2015': 4}, '__delete__': ['BSI-DSZ-CC-0782-V2-', 'BSI-DSZ-CC-S-0087-2017']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 18, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-V2-': 1, 'BSI-DSZ-CC-S-0087-2017': 1}, '__update__': {'BSI-DSZ-CC-0782-V3-2017': 24, 'BSI-DSZ-CC-0782-V2-2015': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'15946-3 2002': 1, '15946-2 2002': 1, '15946-1 2002': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The direct_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The indirect_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to None.
    • The direct_transitive_cves property was set to None.
    • The indirect_transitive_cves property was set to None.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': {'_type': 'Set', 'elements': ['CVE-2017-15361']}, 'indirect_transitive_cves': {'_type': 'Set', 'elements': ['CVE-2017-15361']}}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf, code: nok'].
    • The report_pdf_hash property was set to 66c7e78f3656a24b9da4605c24b468f2a9d426aa54c486b0162316cd4283c25e.
    • The st_txt_hash property was set to 64b11213ba48cde0fac78c817e7d68d4fdf0439e9366308c683c436ed6e1d4d9.
    • The report_txt_hash property was set to ff65edd28910a0e79be5126576d1731a2b2f869896e77bb71b02d6275c9bd89d.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1156210, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20170918132154+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SmartCard, PP-0035, Security IC, Infineon Technologies AG"', '/ModDate': "D:20170918134446+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0782-V3-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1827744, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Creator': 'Microsoft Word - M7892_B11_SCL_public_ST_20170802', '/Producer': 'Nuance PDF Create', '/CreationDate': "D:20170922134010+02'00'", '/ModDate': "D:20170922134010+02'00'", '/Author': 'Dr. Oleg Rudakov', '/Title': 'Security Target Lite', '/Subject': 'M7892 B11 Security Certification', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0782-V3-2017', 'cert_item': 'Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 conformant extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V3-2017': 48, 'BSI-DSZ-CC-0782-V2-2015': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP- 0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 7, 'EAL 5': 10, 'EAL 4': 9, 'EAL 1': 7, 'EAL 2': 4, 'EAL6': 3, 'EAL6+': 3, 'EAL5+': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 6 augmented': 3, 'EAL6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_FLR': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O': 1}}, 'vendor': {'Infineon': {'Infineon': 15, 'Infineon Technologies AG': 21, 'Infineon Technologies': 10}, 'GD': {'G&D': 1, 'Giesecke & Devrient': 1}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 3, 'TDES': 1, '3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 15}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 37}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'SPA': 3, 'DPA': 3}, 'FI': {'physical tampering': 1, 'DFA': 3}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 1, 'AIS 31': 2, 'AIS 25': 1, 'AIS 26': 1, 'AIS 36': 2, 'AIS 35': 1, 'AIS1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS38': 1, 'AIS46': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, “Evaluation': 1, 'Report – ETR (Summary)”, TĂĽv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8': 1, '“Evaluation Technical Report for composite Evaluation (ETR Comp)”, TĂśV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC': 1, 'Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface': 1, 'Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20': 1, 'Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family': 1, '70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller': 1, 'Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference': 1, 'Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01': 1, 'Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21': 1, '70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 8, 'EAL6+': 4, 'EAL4+': 1, 'EAL 6': 1, 'EAL6 augmented': 4, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 2, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 6, 'ADV_IMP': 1, 'ADV_IMP.1': 2, 'ADV_FSP': 1, 'ADV_FSP.4': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 11, 'ALC_DVS.2': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMS': 2, 'ALC_CMS.4': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_COV.2': 3}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 10, 'FAU_SAS': 4, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 14, 'FCS_RNG': 4, 'FCS_COP': 78, 'FCS_CKM': 54, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_CKM.4': 31, 'FCS_CKM.1': 34, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 18, 'FDP_IFC.1': 17, 'FDP_ACC.1': 26, 'FDP_ACF.1': 21, 'FDP_SDI.1': 16, 'FDP_SDI.2': 14, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 29, 'FDP_ITC.2': 29, 'FDP_SDI.1.1': 1, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2}, 'FMT': {'FMT_LIM': 2, 'FMT_LIM.1': 6, 'FMT_LIM.2': 6, 'FMT_MSA.1': 20, 'FMT_MSA.3': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_CKM.4': 1}, 'FPT': {'FPT_TST': 3, 'FPT_TST.2': 33, 'FPT_TST.1': 12, 'FPT_TST.2.1': 2, 'FPT_FLS.1': 19, 'FPT_PHP.3': 25, 'FPT_ITT.1': 18, 'FPT_AMT.1': 1, 'FPT_LIM.2': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 26, 'Infineon Technologies': 1, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 69}}, 'DES': {'DES': {'DES': 16}, '3DES': {'TDES': 49, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 5, 'CBC-MAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 23}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 6}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-512': 1, 'SHA-2': 67}}}, 'crypto_scheme': {'KA': {'Key Agreement': 3}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 11, 'DTRNG': 1}, 'PRNG': {'PRNG': 6}, 'RNG': {'RND': 2, 'RNG': 10}}, 'cipher_mode': {'ECB': {'ECB': 13}, 'CBC': {'CBC': 13}, 'CTR': {'CTR': 8}, 'CFB': {'CFB': 9}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 14}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side-channel': 2, 'side channel': 3, 'SPA': 7, 'DPA': 13}, 'FI': {'Malfunction': 9, 'DFA': 9, 'fault induction': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS 180-4': 1, 'FIPS PUB 197': 3, 'FIPS PUB 180-4': 1}, 'NIST': {'SP 800-67': 3, 'SP 800-38A': 6}, 'BSI': {'AIS31': 9, 'AIS32': 6}, 'RFC': {'RFC3447': 8, 'RFC 5639': 2, 'RFC 3447': 1}, 'ISO': {'ISO/IEC 18092': 4, 'ISO/IEC 7816-3': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-2': 1, 'ISO/IEC 10118': 2, 'ISO/IEC 18033': 2, 'ISO/IEC 15946-1': 1, 'ISO/IEC 97971: 2011': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0782V3a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0782-V3-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2017/74', 'BSI-DSZ-CC-0985-2018', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'KECS-ISIS-1140-2021', 'BSI-DSZ-CC-0782-V5-2020', 'KECS-ISIS-1113-2021', 'BSI-DSZ-CC-0985-2018', 'NSCIB-CC-195748-CR', 'ANSSI-CC-2019/04', 'BSI-DSZ-CC-0987-2019', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2018/27', 'ANSSI-CC-2017/74', 'KECS-ISIS-1139-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015', 'BSI-DSZ-CC-0782-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]} values added.
    • The direct_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf, code: 408', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0782V3b_pdf.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]} values discarded.
    • The direct_dependency_cves property was set to None.
    • The indirect_dependency_cves property was set to None.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['KECS-ISIS-1140-2021']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 66c7e78f3656a24b9da4605c24b468f2a9d426aa54c486b0162316cd4283c25e.
    • The st_txt_hash property was set to 64b11213ba48cde0fac78c817e7d68d4fdf0439e9366308c683c436ed6e1d4d9.
    • The report_txt_hash property was set to ff65edd28910a0e79be5126576d1731a2b2f869896e77bb71b02d6275c9bd89d.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1156210, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20170918132154+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SmartCard, PP-0035, Security IC, Infineon Technologies AG"', '/ModDate': "D:20170918134446+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0782-V3-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1827744, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Creator': 'Microsoft Word - M7892_B11_SCL_public_ST_20170802', '/Producer': 'Nuance PDF Create', '/CreationDate': "D:20170922134010+02'00'", '/ModDate': "D:20170922134010+02'00'", '/Author': 'Dr. Oleg Rudakov', '/Title': 'Security Target Lite', '/Subject': 'M7892 B11 Security Certification', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0782-V3-2017', 'cert_item': 'Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 conformant extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V3-2017': 48, 'BSI-DSZ-CC-0782-V2-2015': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP- 0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 7, 'EAL 5': 10, 'EAL 4': 9, 'EAL 1': 7, 'EAL 2': 4, 'EAL6': 3, 'EAL6+': 3, 'EAL5+': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 6 augmented': 3, 'EAL6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_FLR': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O': 1}}, 'vendor': {'Infineon': {'Infineon': 15, 'Infineon Technologies AG': 21, 'Infineon Technologies': 10}, 'GD': {'G&D': 1, 'Giesecke & Devrient': 1}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 3, 'TDES': 1, '3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 15}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 37}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'SPA': 3, 'DPA': 3}, 'FI': {'physical tampering': 1, 'DFA': 3}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 1, 'AIS 31': 2, 'AIS 25': 1, 'AIS 26': 1, 'AIS 36': 2, 'AIS 35': 1, 'AIS1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS38': 1, 'AIS46': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, “Evaluation': 1, 'Report – ETR (Summary)”, TĂĽv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8': 1, '“Evaluation Technical Report for composite Evaluation (ETR Comp)”, TĂśV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC': 1, 'Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface': 1, 'Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20': 1, 'Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family': 1, '70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller': 1, 'Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference': 1, 'Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01': 1, 'Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21': 1, '70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 8, 'EAL6+': 4, 'EAL4+': 1, 'EAL 6': 1, 'EAL6 augmented': 4, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 2, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 6, 'ADV_IMP': 1, 'ADV_IMP.1': 2, 'ADV_FSP': 1, 'ADV_FSP.4': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 11, 'ALC_DVS.2': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMS': 2, 'ALC_CMS.4': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_COV.2': 3}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 10, 'FAU_SAS': 4, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 14, 'FCS_RNG': 4, 'FCS_COP': 78, 'FCS_CKM': 54, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_CKM.4': 31, 'FCS_CKM.1': 34, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 18, 'FDP_IFC.1': 17, 'FDP_ACC.1': 26, 'FDP_ACF.1': 21, 'FDP_SDI.1': 16, 'FDP_SDI.2': 14, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 29, 'FDP_ITC.2': 29, 'FDP_SDI.1.1': 1, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2}, 'FMT': {'FMT_LIM': 2, 'FMT_LIM.1': 6, 'FMT_LIM.2': 6, 'FMT_MSA.1': 20, 'FMT_MSA.3': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_CKM.4': 1}, 'FPT': {'FPT_TST': 3, 'FPT_TST.2': 33, 'FPT_TST.1': 12, 'FPT_TST.2.1': 2, 'FPT_FLS.1': 19, 'FPT_PHP.3': 25, 'FPT_ITT.1': 18, 'FPT_AMT.1': 1, 'FPT_LIM.2': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 26, 'Infineon Technologies': 1, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 69}}, 'DES': {'DES': {'DES': 16}, '3DES': {'TDES': 49, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 5, 'CBC-MAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 23}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 6}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-512': 1, 'SHA-2': 67}}}, 'crypto_scheme': {'KA': {'Key Agreement': 3}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 11, 'DTRNG': 1}, 'PRNG': {'PRNG': 6}, 'RNG': {'RND': 2, 'RNG': 10}}, 'cipher_mode': {'ECB': {'ECB': 13}, 'CBC': {'CBC': 13}, 'CTR': {'CTR': 8}, 'CFB': {'CFB': 9}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 14}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side-channel': 2, 'side channel': 3, 'SPA': 7, 'DPA': 13}, 'FI': {'Malfunction': 9, 'DFA': 9, 'fault induction': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS 180-4': 1, 'FIPS PUB 197': 3, 'FIPS PUB 180-4': 1}, 'NIST': {'SP 800-67': 3, 'SP 800-38A': 6}, 'BSI': {'AIS31': 9, 'AIS32': 6}, 'RFC': {'RFC3447': 8, 'RFC 5639': 2, 'RFC 3447': 1}, 'ISO': {'ISO/IEC 18092': 4, 'ISO/IEC 7816-3': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-2': 1, 'ISO/IEC 10118': 2, 'ISO/IEC 18033': 2, 'ISO/IEC 15946-1': 1, 'ISO/IEC 97971: 2011': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0782V3a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0782-V3-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2017/74', 'BSI-DSZ-CC-0985-2018', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'KECS-ISIS-1140-2021', 'BSI-DSZ-CC-0782-V5-2020', 'KECS-ISIS-1113-2021', 'BSI-DSZ-CC-0985-2018', 'NSCIB-CC-195748-CR', 'ANSSI-CC-2019/04', 'BSI-DSZ-CC-0987-2019', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2018/27', 'ANSSI-CC-2017/74', 'KECS-ISIS-1139-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015', 'BSI-DSZ-CC-0782-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]} values added.
    • The direct_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0782V3b_pdf.pdf, code: 408'].
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]} values discarded.
    • The direct_dependency_cves property was set to None.
    • The indirect_dependency_cves property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/45']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/45']}}} data.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-196231-CR']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/45']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/45']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018']}}} data.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/74']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/74']}}} data.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The direct_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_link': None, 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
    • The direct_dependency_cves property was set to None.
    • The indirect_dependency_cves property was set to None.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0782V3a_pdf.pdf', 'st_filename': '0782V3b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0782-V3-2017': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 6': 7, 'EAL 4': 9, 'EAL 2': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 6}, '__delete__': ['ALC_LCD']}}}, 'cc_claims': {'__update__': {'R': {'R.O': 1}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 21, 'Infineon Technologies': 10}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 4}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 2}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {'__update__': {'IBM': {'__delete__': ['SE']}}}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report – ETR (Summary)”, TĂĽv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8': 1, '“Evaluation Technical Report for composite Evaluation (ETR Comp)”, TĂśV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC': 1, 'Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface': 1, 'Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20': 1, 'Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family': 1, '70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller': 1, 'Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference': 1, 'Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01': 1, 'Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21': 1, '70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', 'Technical Report – ETR (Summary)”, TĂĽv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8', '8, “Evaluation Technical Report for composite Evaluation (ETR Comp)”, TĂśV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC', 'for Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface', '2017-05-02, Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20', 'Infineon Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family', 'SLE 70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller', 'y Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference', 'Manual. Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01', '2009-11, Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21', 'SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__delete__': ['EAL3']}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_SPM.1': 6}}, 'ALC': {'__update__': {'ALC_FLR.1': 11}}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 10}}, 'FCS': {'__insert__': {'FCS_COP': 78, 'FCS_CKM': 54}, '__update__': {'FCS_RNG.1': 14, 'FCS_COP.1': 23, 'FCS_CKM.4': 31, 'FCS_CKM.1': 34}}, 'FDP': {'__update__': {'FDP_ITT.1': 18, 'FDP_SDI.1': 16, 'FDP_SDI.2': 14}}, 'FMT': {'__update__': {'FMT_LIM.2': 6, 'FMT_MSA.3': 21, 'FMT_SMF.1': 16}}, 'FPT': {'__update__': {'FPT_TST.2': 33, 'FPT_FLS.1': 19, 'FPT_PHP.3': 25, 'FPT_ITT.1': 18}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 26, 'Infineon Technologies': 1}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 69}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 16}}, '3DES': {'__update__': {'TDES': 49}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CBC-MAC': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 9}}, 'ECDSA': {'__update__': {'ECDSA': 23}}, 'ECC': {'__update__': {'ECC': 14}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}, 'DSA': {'__update__': {'DSA': 1}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__insert__': {'SHA-512': 1}}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 11}}, 'RNG': {'__update__': {'RNG': 10}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 13}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 7}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 197': 3}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['KECS-ISIS-1113-2021', 'KECS-ISIS-1140-2021', 'KECS-ISIS-1139-2021']}}} data.
  • 05.09.2022 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V3-2017': 86, 'BSI-DSZ-CC-0782-V2-2015': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP- 0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 8, 'EAL 5': 10, 'EAL 4': 10, 'EAL 1': 7, 'EAL 2': 5, 'EAL6': 3, 'EAL6+': 3, 'EAL5+': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 6 augmented': 3, 'EAL6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O.C': 1}}, 'vendor': {'Infineon': {'Infineon': 15, 'Infineon Technologies AG': 19, 'Infineon Technologies': 12}, 'GD': {'G&D': 1, 'Giesecke & Devrient': 1}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 3, 'TDES': 1, '3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 15}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 5}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 37}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'SPA': 3, 'DPA': 3}, 'FI': {'physical tampering': 1, 'DFA': 3}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1, 'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 1, 'AIS 31': 2, 'AIS 25': 1, 'AIS 26': 1, 'AIS 36': 2, 'AIS 35': 1, 'AIS1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS38': 1, 'AIS46': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, “Evaluation': 1, 'Technical Report – ETR (Summary)”, TĂĽv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8': 1, '8, “Evaluation Technical Report for composite Evaluation (ETR Comp)”, TĂśV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, “Configuration Management Scope ALC': 1, 'for Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface': 1, '2017-05-02, Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20': 1, 'Infineon Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family': 1, 'SLE 70 Programmer’s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller': 1, 'y Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference': 1, 'Manual. Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01': 1, '2009-11, Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21': 1, 'SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 8, 'EAL6+': 4, 'EAL3': 1, 'EAL4+': 1, 'EAL 6': 1, 'EAL6 augmented': 4, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 2, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2, 'ADV_IMP': 1, 'ADV_IMP.1': 2, 'ADV_FSP': 1, 'ADV_FSP.4': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 6, 'ALC_DVS.2': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMS': 2, 'ALC_CMS.4': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_COV.2': 3}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 4, 'FAU_SAS.1': 8, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 13, 'FCS_RNG': 4, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 13, 'FCS_CKM.4': 28, 'FCS_CKM.1': 32, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 14, 'FDP_IFC.1': 17, 'FDP_ACC.1': 26, 'FDP_ACF.1': 21, 'FDP_SDI.1': 15, 'FDP_SDI.2': 13, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 29, 'FDP_ITC.2': 29, 'FDP_SDI.1.1': 1, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2}, 'FMT': {'FMT_LIM': 2, 'FMT_LIM.1': 6, 'FMT_LIM.2': 5, 'FMT_MSA.1': 20, 'FMT_MSA.3': 20, 'FMT_SMF.1': 15, 'FMT_SMR.1': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_CKM.4': 1}, 'FPT': {'FPT_TST': 3, 'FPT_TST.2': 28, 'FPT_TST.1': 12, 'FPT_TST.2.1': 2, 'FPT_FLS.1': 12, 'FPT_PHP.3': 21, 'FPT_ITT.1': 16, 'FPT_AMT.1': 1, 'FPT_LIM.2': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 20, 'Infineon Technologies': 7, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 87}}, 'DES': {'DES': {'DES': 87}, '3DES': {'TDES': 69, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 5, 'CBC-MAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 19}, 'ECDSA': {'ECDSA': 34}, 'ECC': {'ECC': 12}}, 'FF': {'DH': {'Diffie-Hellman': 6, 'DH': 19}, 'DSA': {'DSA': 35}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-2': 67}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 3}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 21, 'DTRNG': 1}, 'PRNG': {'PRNG': 6}, 'RNG': {'RNG': 47, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 13}, 'CBC': {'CBC': 20}, 'CTR': {'CTR': 8}, 'CFB': {'CFB': 9}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 14}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side-channel': 2, 'side channel': 3, 'SPA': 8, 'DPA': 13}, 'FI': {'Malfunction': 9, 'DFA': 9, 'fault induction': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS 180-4': 1, 'FIPS PUB 197': 2, 'FIPS PUB 180-4': 1}, 'NIST': {'SP 800-67': 3, 'SP 800-38A': 6}, 'BSI': {'AIS31': 9, 'AIS32': 6}, 'RFC': {'RFC3447': 8, 'RFC 5639': 2, 'RFC 3447': 1}, 'ISO': {'ISO/IEC 18092': 4, 'ISO/IEC 7816-3': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-2': 1, 'ISO/IEC 10118': 2, 'ISO/IEC 18033': 2, 'ISO/IEC 15946-1': 1, 'ISO/IEC 97971: 2011': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '66c7e78f3656a24b9da4605c24b468f2a9d426aa54c486b0162316cd4283c25e', 'st_pdf_hash': 'cbb29a78748646e6003cc66f1f23416764937a74e88c0e5dc4af7ce4a7b335a4', 'report_txt_hash': 'ff65edd28910a0e79be5126576d1731a2b2f869896e77bb71b02d6275c9bd89d', 'st_txt_hash': '64b11213ba48cde0fac78c817e7d68d4fdf0439e9366308c683c436ed6e1d4d9'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 7, 'DES': 7, 'TDES': 1, '3DES': 1}, 'rules_asymmetric_crypto': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1, 'ECDH': 1, 'ECDSA': 1, 'ECC': 3, 'DH': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 2, 'PRNG': 1, 'RNG': 5}, 'rules_tee': {'SSC': 1, 'SE': 1}, 'rules_side_channels': {'physical probing': 1, 'physical tampering': 1, 'SPA': 3, 'DPA': 3, 'DFA': 3}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 87, 'TDES': 69, 'DES': 18, 'HMAC': 5}, 'rules_asymmetric_crypto': {'RSA2048': 1, 'RSA4096': 1, 'RSA-2048': 1, 'ECDH': 19, 'ECDSA': 34, 'ECC': 12, 'Diffie-Hellman': 6, 'DH': 19, 'DSA': 35}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 1}, 'rules_crypto_schemes': {'MAC': 10}, 'rules_randomness': {'DTRNG': 1, 'TRNG': 22, 'PRNG': 6, 'RNG': 47, 'RND': 2}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 9, 'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side-channel': 2, 'side channel': 3, 'SPA': 8, 'DPA': 13, 'DFA': 8, 'fault induction': 1}} values inserted.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The direct_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-15361']}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2017/74', 'ANSSI-CC-2018/45', 'BSI-DSZ-CC-0987-2019']}, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2017/74', 'BSI-DSZ-CC-0985-2018', 'BSI-DSZ-CC-0987-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'BSI-DSZ-CC-0782-V5-2020', 'NSCIB-CC-195748-CR', 'BSI-DSZ-CC-0985-2018', 'ANSSI-CC-2019/04', 'BSI-DSZ-CC-0987-2019', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2018/27', 'ANSSI-CC-2017/74']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V2-2015', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V2']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.02.012', '1.02.013', '1.01']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2017/74', 'BSI-DSZ-CC-0985-2018', 'BSI-DSZ-CC-0987-2019']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c96ac4c4015414ad",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0782-V3-2017",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02.013",
        "1.01",
        "2.02.012"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-15361"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0987-2019",
          "BSI-DSZ-CC-0985-2018",
          "BSI-DSZ-CC-0782-V4-2018",
          "ANSSI-CC-2017/74"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V2-2015"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V5-2020",
          "NSCIB-CC-195748-CR",
          "BSI-DSZ-CC-0782-V4-2018",
          "KECS-ISIS-1140-2021",
          "KECS-ISIS-1113-2021",
          "KECS-ISIS-1139-2021",
          "ANSSI-CC-2018/27",
          "ANSSI-CC-2019/04",
          "BSI-DSZ-CC-0985-2018",
          "NSCIB-CC-196231-CR",
          "BSI-DSZ-CC-0987-2019",
          "ANSSI-CC-2017/74"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V2-2015",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0987-2019",
          "BSI-DSZ-CC-0985-2018",
          "ANSSI-CC-2017/74",
          "ANSSI-CC-2018/45"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0987-2019",
          "BSI-DSZ-CC-0985-2018",
          "ANSSI-CC-2018/45",
          "ANSSI-CC-2017/74"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)",
  "not_valid_after": "2022-09-04",
  "not_valid_before": "2017-09-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0782V3a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant extended",
        "cert_id": "BSI-DSZ-CC-0782-V3-2017",
        "cert_item": "Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013, and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "RSA": {
          "RSA-2048": 1,
          "RSA2048": 1,
          "RSA4096": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V2-": 1,
          "BSI-DSZ-CC-0782-V2-2015": 2,
          "BSI-DSZ-CC-0782-V3-2017": 24,
          "BSI-DSZ-CC-S-0087-2017": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 1
        },
        "R": {
          "R.O": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0035-2007": 1,
          "BSI-CC-PP-0035-2007": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 2,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 2,
          "ADV_SPM": 1,
          "ADV_SPM.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 2,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 3,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 3,
          "ALC_FLR.1": 6,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 3
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 2,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 2,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 9,
          "EAL 5": 10,
          "EAL 6": 7,
          "EAL 6 augmented": 3,
          "EAL 7": 4,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL6 augmented": 3,
          "EAL6+": 3
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "70 Family Production and Personalization User\u2019s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 25 / 40 Certification Report BSI-DSZ-CC-0782-V3-2017 This page is intentionally left blank. 26 ": 1,
          "70 Programmer\u2019s Reference Manual, 2017-07-04, Infineon Technologies AG (confidential document) [16] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [17] M7892 SOLID FLASH Controller": 1,
          "Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11\u201d (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface": 1,
          "Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [18] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference": 1,
          "Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20": 1,
          "Infineon Technologies AG (confidential document) [20] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [21": 1,
          "M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)\u201d, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V3-2017, Version 4, 2017-08-28, \u201cEvaluation": 1,
          "Report \u2013 ETR (Summary)\u201d, T\u00fcv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 8": 1,
          "Technologies AG (confidential document) [14] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [15] 16-bit Controller Family": 1,
          "Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [19] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "\u201cEvaluation Technical Report for composite Evaluation (ETR Comp)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.0, 2017-07-05, \u201cConfiguration Management Scope ALC": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 37
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 15
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 2
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 34": 1,
          "AIS 35": 1,
          "AIS 36": 2,
          "AIS1": 1,
          "AIS14": 1,
          "AIS19": 1,
          "AIS20": 1,
          "AIS25": 1,
          "AIS26": 1,
          "AIS31": 1,
          "AIS32": 1,
          "AIS34": 1,
          "AIS35": 1,
          "AIS36": 1,
          "AIS38": 1,
          "AIS46": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1,
          "Giesecke \u0026 Devrient": 1
        },
        "Infineon": {
          "Infineon": 15,
          "Infineon Technologies": 10,
          "Infineon Technologies AG": 21
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20170918132154+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SmartCard, PP-0035, Security IC, Infineon Technologies AG\"",
      "/ModDate": "D:20170918134446+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0782-V3-2017",
      "pdf_file_size_bytes": 1156210,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "0782V3b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 23
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-2048": 1,
          "RSA2048": 1,
          "RSA4096": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.4": 4,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 6,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 3,
          "ALC_CMS": 2,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR.1": 11,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 3,
          "ATE_COV.3": 4,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4+": 1,
          "EAL6": 8,
          "EAL6 augmented": 4,
          "EAL6+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 54,
          "FCS_CKM.1": 34,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 31,
          "FCS_COP": 78,
          "FCS_COP.1": 23,
          "FCS_RNG": 4,
          "FCS_RNG.1": 14,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 26,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 21,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 17,
          "FDP_ITC.1": 29,
          "FDP_ITC.2": 29,
          "FDP_ITT.1": 18,
          "FDP_SDI.1": 16,
          "FDP_SDI.1.1": 1,
          "FDP_SDI.2": 14,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2
        },
        "FMT": {
          "FMT_CKM.4": 1,
          "FMT_LIM": 2,
          "FMT_LIM.1": 6,
          "FMT_LIM.2": 6,
          "FMT_MSA.1": 20,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 21,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 19,
          "FPT_ITT.1": 18,
          "FPT_LIM.2": 1,
          "FPT_PHP.3": 25,
          "FPT_TST": 3,
          "FPT_TST.1": 12,
          "FPT_TST.2": 33,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 13
        },
        "CFB": {
          "CFB": 9
        },
        "CTR": {
          "CTR": 8
        },
        "ECB": {
          "ECB": 13
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 14
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 67,
            "SHA-256": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 6
        },
        "RNG": {
          "RND": 2,
          "RNG": 10
        },
        "TRNG": {
          "DTRNG": 1,
          "TRNG": 11
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 9,
          "Malfunction": 9,
          "fault induction": 1
        },
        "SCA": {
          "DPA": 13,
          "Leak-Inherent": 11,
          "Physical Probing": 2,
          "SPA": 7,
          "physical probing": 1,
          "side channel": 3,
          "side-channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 9,
          "AIS32": 6
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 2,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 3
        },
        "ISO": {
          "ISO/IEC 10118": 2,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-2": 1,
          "ISO/IEC 15946-3": 1,
          "ISO/IEC 18033": 2,
          "ISO/IEC 18092": 4,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 97971: 2011": 1
        },
        "NIST": {
          "SP 800-38A": 6,
          "SP 800-67": 3
        },
        "RFC": {
          "RFC 3447": 1,
          "RFC 5639": 2,
          "RFC3447": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 69
          }
        },
        "DES": {
          "3DES": {
            "TDES": 49,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 16
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 6,
            "HMAC": 5
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 1": 2,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 14,
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 26
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Dr. Oleg Rudakov",
      "/CreationDate": "D:20170922134010+02\u002700\u0027",
      "/Creator": "Microsoft Word - M7892_B11_SCL_public_ST_20170802",
      "/ModDate": "D:20170922134010+02\u002700\u0027",
      "/Producer": "Nuance PDF Create",
      "/Subject": "M7892 B11 Security Certification",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1827744,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 98
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_V1.0",
            "PKISKPP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0782V3a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0782V3b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "66c7e78f3656a24b9da4605c24b468f2a9d426aa54c486b0162316cd4283c25e",
      "txt_hash": "ff65edd28910a0e79be5126576d1731a2b2f869896e77bb71b02d6275c9bd89d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cbb29a78748646e6003cc66f1f23416764937a74e88c0e5dc4af7ce4a7b335a4",
      "txt_hash": "64b11213ba48cde0fac78c817e7d68d4fdf0439e9366308c683c436ed6e1d4d9"
    }
  },
  "status": "archived"
}