Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software

CSV information ?

Status archived
Valid from 06.11.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VLA.4, EAL5+, AVA_MSU.3, ALC_DVS.2
Maintenance updates Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software (09.06.2009) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0523-2008

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Asymmetric Algorithms
RSA2048, RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman
Randomness
RNG
Block cipher modes
ECB, CBC

Vendor
Infineon, Infineon Technologies AG, Infineon AG, Infineon Technologies, Philips

Security level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmented
Security Assurance Requirements (SAR)
ACM_SCP, ACM_AUT, ACM_CAP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0523, CC-0437-2007
Evaluation facilities
TÃœV Informationstechnik
Certification process
RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen, all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID, RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09

Side-channel analysis
physical probing, DPA, SPA, physical tampering, JIL
Certification process
RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen, all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID, RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09

Standards
FIPS140, AIS 34, AIS 31, AIS 25, AIS 26, AIS 32, AIS 35, AIS 36, AIS 38, ISO/IEC 14443, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title: Certification Report BSI-DSZ-CC-0523-2008
Subject: Common Criteria Certification
Keywords: "Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12,SLE66CLX1600PE / m1596-a12,SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12,SLE66CLX1440PEM / m2090-a12,SLE66CLX1440PE / m2091-a12,SLE66CLX1440PES / m2092-a12,SLE66CX1440PE / m2093-a12,SLE66CLX1280PEM / m2094-a12,SLE66CLX1280PE / m2095-a12,SLE66CLX1280PES / m2096-a12,SLE66CX1280PE / m2097-a12all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon Technologies AG, BSI-DSZ-CC-0523-2008, SmartCard Controller"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20081117105441+01'00'
Modification date: D:20081120082435+01'00'
Pages: 42
Creator: Writer
Producer: StarOffice 8

References

Outgoing
  • BSI-DSZ-CC-0322-2005 - Infineon Smart Card IC (Security Controller) SLE66CX680PE/m1534a13 and SLE66CX360PE/m1536a13 both with RSA 2048 V1.4 and specific IC Dedicated Software
  • BSI-DSZ-CC-0482-2008 - Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
Incoming
  • BSI-DSZ-CC-0630-2010 - Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / M1590 / A12, SLE66CLX1600PE / M1596 / A12, SLE66CLX1600PES / M1597 / A12, SLE66CX1600PE / M1598 / A12, SLE66CLX1440PEM / M2090 / A12, SLE66CLX1440PE / M2091 / A12, SLE66CLX1440PES / M2092 / A12, SLE66CX1440PE / M2093 / A12, SLE66CLX1280PEM / M2094 / A12, SLE66CLX1280PE / M2095 / A12, SLE66CLX1280PES / M2096 / A12, SLE66CX1280PE / M2097 / A12 all optional with RSA V1.6, EC V1.1 and SHA-2 V1.0 and all with specific IC dedicated software
  • ANSSI-CC-2011/80 - Mécanisme SAC de l'application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440PE m2091/a13
  • ANSSI-CC-2011/79 - Application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440PE m2091/a13
  • ANSSI-CC-2011/13 - eTravel BAC on MultiApp v2
  • ANSSI-CC-2011/16 - Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66
  • BSI-DSZ-CC-0593-2009 - Infineon Smart Card IC (Security Controller) SLE66CLX206PEM / m2084-a11, SLE66CLX206PE / m2085-a11, SLE66CLX206PES / m2086-a11, SLE66CDX206PEM / m2099-a11, SLE66CLX203PEM / m2098-a11, SLE66CLX207PEM / m2980-a11, SLE66CLX207PE / m2981-a11, SLE66CLX207PES / m2982-a11, SLE66CLX126PEM / m2087-a11, SLE66CLX126PE / m2088-a11, SLE66CLX126PES / m2089-a11, SLE66CLX127PEM / m2997-a11, SLE66CLX127PE / m2998-a11, SLE66CLX127PES / m2999-a11, all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and all with specific IC dedicated software
  • ANSSI-CC-2011/12 - eTravel EAC on MultiApp v2
  • ANSSI-CC-2011/10 - Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66

Security target ?

Extracted keywords

Symmetric Algorithms
DES, 3DES, Triple-DES
Asymmetric Algorithms
RSA2048, RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Schemes
Key Agreement
Randomness
RNG, RND

Vendor
Infineon Technologies AG, Infineon

Security level
EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_FSP.2, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_SOF
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FCS_RND.1.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_CKM.2, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.2.1, FPT_TST.2, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.1, FPT_TST.2.1, FPT_AMT.1, FPT_TDC.1, FPT_TST, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0002
Certificates
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008
Certification process
out of scope, single DES is out of scope of the evaluation, key length below 1280 bit are out of scope of the evaluation, key length below 192 bit are out of scope of the evaluation, smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048, key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key, according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding

Side-channel analysis
Leak-Inherent, Physical Probing, SPA, DPA, Malfunction, malfunction, DFA, reverse engineering
Certification process
out of scope, single DES is out of scope of the evaluation, key length below 1280 bit are out of scope of the evaluation, key length below 192 bit are out of scope of the evaluation, smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048, key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key, according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding

Standards
FIPS PUB 46-3, PKCS#1, AIS31, RFC2437, ISO/IEC 7816-3, ISO/IEC 7816, CCMB-2005-08-001, CCMB-2005-08-003, CCMB-2005-08-002

File metadata

Title: CC EAL5+ Certification Security Target
Subject: Security Target SLE66CLX1600PEx - SLE66CLX1400PEx - SLE66CLX1280PEx a12
Keywords: "Security Target, contactless, dual interface, Security Controller, public, document, resistance to attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, RSA, Elliptic Curve, Libraries, Dresden, crypto"
Author: Buchmueller Hans-Ulrich
Creation date: D:20081030093245Z
Modification date: D:20081120082822+01'00'
Pages: 60
Creator: Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word
Producer: Acrobat PDFWriter 5.0 for Windows NT

References

Outgoing
  • BSI-DSZ-CC-0322-2005 - Infineon Smart Card IC (Security Controller) SLE66CX680PE/m1534a13 and SLE66CX360PE/m1536a13 both with RSA 2048 V1.4 and specific IC Dedicated Software
  • BSI-DSZ-CC-0482-2008 - Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
  • BSI-DSZ-CC-0266-2005 - Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software
  • BSI-DSZ-CC-0430-2008 - Infineon Smart Card IC (Security Controller), SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / 1587 e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES /m1589-e12, SLE66CLX800PE /m1599-e12 all with RSA 2048 V 1.5 and ECC V 1.1 and specific Dedicated Software
Incoming
  • BSI-DSZ-CC-0630-2010 - Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / M1590 / A12, SLE66CLX1600PE / M1596 / A12, SLE66CLX1600PES / M1597 / A12, SLE66CX1600PE / M1598 / A12, SLE66CLX1440PEM / M2090 / A12, SLE66CLX1440PE / M2091 / A12, SLE66CLX1440PES / M2092 / A12, SLE66CX1440PE / M2093 / A12, SLE66CLX1280PEM / M2094 / A12, SLE66CLX1280PE / M2095 / A12, SLE66CLX1280PES / M2096 / A12, SLE66CX1280PE / M2097 / A12 all optional with RSA V1.6, EC V1.1 and SHA-2 V1.0 and all with specific IC dedicated software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0523-2008

Extracted SARs

AVA_VLA.4, AVA_CCA.1, ALC_TAT.2, ATE_DPT.2, ADV_FSP.3, AGD_USR.1, ADV_SPM.3, ADV_INT.1, AVA_MSU.3, ADV_LLD.1, ATE_FUN.1, ALC_LCD.2, AVA_SOF.1, AGD_ADM.1, ATE_IND.2, ADV_IMP.2, ATE_COV.2, ADV_RCR.2, ADV_HLD.3, ALC_DVS.2

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894', 'txt_hash': 'a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c', 'txt_hash': '900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0437-2007': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0523': 2}, '__update__': {'BSI-DSZ-CC-0523-2008': 22, 'BSI-DSZ-CC-0482-2008': 5, 'BSI-DSZ-CC-0322-2005': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0266-2005': 1, 'BSI-DSZ-CC-0322-2005': 1, 'BSI-DSZ-CC-0430-2008': 1, 'BSI-DSZ-CC-0482-2008': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0523-2008': 44, 'BSI-DSZ-CC-0482-2008': 10, 'BSI-DSZ-CC-0322-2005': 2}, '__delete__': ['BSI-DSZ-CC-0523']}}, '__delete__': ['NL']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0266-2005': 2, 'BSI-DSZ-CC-0322-2005': 2, 'BSI-DSZ-CC-0430-2008': 2, 'BSI-DSZ-CC-0482-2008': 2}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0437-2007': 1}, 'CA': {'1 1 2': 5, '1 2 3': 5, '4 5 5': 1, '1 1 1': 11, '3 3 4': 1, '1 2 2': 6, '2 2 3': 2, '1 3 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0523': 2}, '__update__': {'BSI-DSZ-CC-0523-2008': 22, 'BSI-DSZ-CC-0482-2008': 5, 'BSI-DSZ-CC-0322-2005': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0266-2005': 1, 'BSI-DSZ-CC-0322-2005': 1, 'BSI-DSZ-CC-0430-2008': 1, 'BSI-DSZ-CC-0482-2008': 1}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2009-06-09', 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0523_ma1.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': {'_type': 'Set', 'elements': ['CVE-2021-3011']}}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}} data.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894.
    • The report_txt_hash property was set to a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 551749, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/CreationDate': "D:20081117105441+01'00'", '/Subject': 'Common Criteria Certification', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12,SLE66CLX1600PE / m1596-a12,SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12,SLE66CLX1440PEM / m2090-a12,SLE66CLX1440PE / m2091-a12,SLE66CLX1440PES / m2092-a12,SLE66CX1440PE / m2093-a12,SLE66CLX1280PEM / m2094-a12,SLE66CLX1280PE / m2095-a12,SLE66CLX1280PES / m2096-a12,SLE66CX1280PE / m2097-a12all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon Technologies AG, BSI-DSZ-CC-0523-2008, SmartCard Controller"', '/Producer': 'StarOffice 8', '/ModDate': "D:20081120082435+01'00'", '/Title': 'Certification Report BSI-DSZ-CC-0523-2008', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0523-2008': 44, 'BSI-DSZ-CC-0482-2008': 10, 'BSI-DSZ-CC-0322-2005': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 5, 'EAL4': 7, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 2, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_SCP': 3, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.3': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 12, 'Infineon Technologies AG': 11, 'Infineon AG': 24, 'Infineon Technologies': 6}, 'Philips': {'Philips': 1}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 4}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 23, 'RSA 2048': 28}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 52}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140': 1}, 'BSI': {'AIS 34': 3, 'AIS 31': 4, 'AIS 25': 3, 'AIS 26': 2, 'AIS 32': 1, 'AIS 35': 1, 'AIS 36': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen': 1, 'all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID': 1, 'RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09': 1}}}.
    • The report_filename property was set to 0523a.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to BSI-DSZ-CC-0523-2008.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0430-2008', 'BSI-DSZ-CC-0482-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0430-2008', 'BSI-DSZ-CC-0482-2008']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/80', 'ANSSI-CC-2011/79', 'BSI-DSZ-CC-0630-2010', 'ANSSI-CC-2011/13', 'ANSSI-CC-2011/16', 'ANSSI-CC-2011/12', 'BSI-DSZ-CC-0593-2009', 'ANSSI-CC-2011/10']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/80', 'ANSSI-CC-2011/79', 'BSI-DSZ-CC-0630-2010', 'ANSSI-CC-2011/13', 'ANSSI-CC-2011/16', 'ANSSI-CC-2011/12', 'BSI-DSZ-CC-0593-2009', 'ANSSI-CC-2011/10', 'BSI-DSZ-CC-0784-2013']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}} data.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to False.
    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0523a.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c.
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to 900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to {'pdf_file_size_bytes': 442657, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 60, '/CreationDate': 'D:20081030093245Z', '/Subject': 'Security Target SLE66CLX1600PEx - SLE66CLX1400PEx - SLE66CLX1280PEx a12', '/Author': 'Buchmueller Hans-Ulrich', '/Creator': 'Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word', '/Keywords': '"Security Target, contactless, dual interface, Security Controller, public, document, resistance to attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, RSA, Elliptic Curve, Libraries, Dresden, crypto"', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/ModDate': "D:20081120082822+01'00'", '/Title': 'CC EAL5+ Certification Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to None.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0266-2005': 2, 'BSI-DSZ-CC-0322-2005': 2, 'BSI-DSZ-CC-0430-2008': 2, 'BSI-DSZ-CC-0482-2008': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 2}}, 'cc_security_level': {'EAL': {'EAL5': 5, 'EAL5+': 2, 'EAL 5': 4, 'EAL5 augmented': 2, 'EAL 5 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 1, 'ACM_SCP.3': 5, 'ACM_SCP': 3, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.3': 5, 'ADV_HLD.3': 3, 'ADV_IMP.2': 3, 'ADV_INT.1': 3, 'ADV_LLD.1': 3, 'ADV_RCR.2': 3, 'ADV_SPM.3': 2, 'ADV_FSP': 1, 'ADV_FSP.2': 1, 'ADV_SPM.1': 3}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.2': 4, 'ALC_LCD.2': 1, 'ALC_TAT.2': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.3': 3, 'AVA_VLA.4': 4, 'AVA_CCA.1': 2, 'AVA_SOF.1': 2, 'AVA_SOF': 4}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 4, 'FCS_COP.1': 45, 'FCS_CKM.1': 49, 'FCS_COP.1.1': 4, 'FCS_CKM.4': 30, 'FCS_CKM.1.1': 5, 'FCS_CKM.2': 7, 'FCS_CKM.4.1': 3, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITT.1': 3, 'FDP_IFC.1': 14, 'FDP_ACC.1': 25, 'FDP_ACF.1': 15, 'FDP_SDI.1': 17, 'FDP_SDI.2': 15, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 24, 'FDP_ITC.2': 23, 'FDP_SDI.1.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1.1': 3, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 3, 'FDP_ITC.2.1': 3, 'FDP_ITC.2.2': 3, 'FDP_ITC.2.3': 3, 'FDP_ITC.2.4': 3, 'FDP_ITC.2.5': 3, 'FDP_CKM.2': 1}, 'FMT': {'FMT_LIM.1': 4, 'FMT_LIM.2': 4, 'FMT_MSA.3': 16, 'FMT_MSA.1': 15, 'FMT_SMF.1': 9, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 9, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 32, 'FMT_MSA.2.1': 3}, 'FPT': {'FPT_TST.2': 26, 'FPT_FLS.1': 6, 'FPT_SEP.1': 6, 'FPT_PHP.3': 7, 'FPT_ITT.1': 3, 'FPT_TST.1': 11, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 4, 'FPT_TDC.1': 3, 'FPT_TST': 2}, 'FRU': {'FRU_FLT.2': 6}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 7, 'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 11}, '3DES': {'3DES': 21, 'Triple-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 19, 'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 14}, 'ECC': {'ECC': 47}}, 'FF': {'DH': {'Diffie-Hellman': 4}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 7, 'RND': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'SPA': 4, 'DPA': 6}, 'FI': {'Malfunction': 15, 'malfunction': 3, 'DFA': 4}, 'other': {'reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS31': 9}, 'RFC': {'RFC2437': 3}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 7816': 6}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'single DES is out of scope of the evaluation': 1, 'key length below 1280 bit are out of scope of the evaluation': 1, 'key length below 192 bit are out of scope of the evaluation': 1, 'smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048': 1, 'key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key': 1, 'according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding': 1}}}.
    • The report_filename property was set to None.
    • The st_filename property was set to 0523b.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
    • The indirect_dependency_cves property was set to None.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was updated, with the [[1, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0523b.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010', 'BSI-DSZ-CC-0784-2013']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0399-2007']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0523a.pdf, code: 408'].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010', 'BSI-DSZ-CC-0784-2013']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/10']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}}} data.
    • The indirect_dependency_cves property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/10']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/79']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/10']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/79']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/79']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/13']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/79']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/13']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/13']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/13']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0430-2007']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-322-2005', 'BSI-DSZ-CC-0265-2004', 'BSI-DSZ-CC-338-2005']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0523a.pdf', 'st_filename': '0523b.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0523-2008': 44, 'BSI-DSZ-CC-0482-2008': 10}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 7, 'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 9}}}}}}, 'asymmetric_crypto': {'__update__': {'RSA': {'__update__': {'RSA2048': 23}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'tee_name': {}, 'certification_process': {'__update__': {'ConfidentialDocument': {'RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen': 1, 'all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID': 1, 'RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0266-2005': 2, 'BSI-DSZ-CC-0430-2008': 2, 'BSI-DSZ-CC-0482-2008': 2}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 5 augmented': 4}}}}, 'cc_sar': {'__update__': {'ACM': {'__update__': {'ACM_CAP.4': 1, 'ACM_SCP.3': 5}}, 'ADV': {'__update__': {'ADV_FSP.3': 5}}, 'ALC': {'__update__': {'ALC_LCD.2': 1}}, 'ATE': {'__update__': {'ATE_DPT.2': 1}}, 'AVA': {'__update__': {'AVA_MSU.3': 3, 'AVA_VLA.4': 4}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 4}}, 'FCS': {'__update__': {'FCS_RND.1': 4, 'FCS_COP.1': 45, 'FCS_RND': 2}}, 'FDP': {'__update__': {'FDP_ACF.1': 15, 'FDP_SDI.2': 15}, '__delete__': ['FDP_SDI.2.1']}, 'FMT': {'__update__': {'FMT_MSA.1': 15, 'FMT_SMF.1': 9, 'FMT_SMR.1': 9}}, 'FPT': {'__update__': {'FPT_PHP.3': 7, 'FPT_TST.2': 26, 'FPT_AMT.1': 4}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 7}, '__delete__': ['Infineon Technologies']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 11}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}, 'DSA': {'__update__': {'DSA': 1}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 2}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 4, 'DPA': 6}}, 'FI': {'__update__': {'malfunction': 3}}, 'other': {'__update__': {'reverse engineering': 2}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 7816': 6}}, 'CC': {'__update__': {'CCMB-2005-08-002': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'single DES is out of scope of the evaluation': 1, 'key length below 1280 bit are out of scope of the evaluation': 1, 'key length below 192 bit are out of scope of the evaluation': 1, 'key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key': 1, 'according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding': 1}, '__delete__': ['(single DES is out of scope of the evaluation', '(key length below 1280 bit are out of scope of the evaluation', '(key length below 192 bit are out of scope of the evaluation', 'bits key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key', 'agreement according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding']}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0630-2010']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0430-2008', 'BSI-DSZ-CC-0482-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0430-2007', 'BSI-DSZ-CC-0430-2008']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/80', 'ANSSI-CC-2011/79', 'BSI-DSZ-CC-0630-2010', 'ANSSI-CC-2011/13', 'ANSSI-CC-2011/16', 'ANSSI-CC-2011/12', 'BSI-DSZ-CC-0593-2009', 'ANSSI-CC-2011/10']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/80', 'ANSSI-CC-2011/79', 'BSI-DSZ-CC-0630-2010', 'ANSSI-CC-2011/13', 'ANSSI-CC-2011/16', 'ANSSI-CC-2011/12', 'BSI-DSZ-CC-0593-2009', 'ANSSI-CC-2011/10', 'BSI-DSZ-CC-0784-2013']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0265-2004', 'BSI-DSZ-CC-338-2005', 'BSI-DSZ-CC-0482-2008', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-322-2005', 'BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}} data.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2009-06-09', 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0523_ma1.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0523-2008': 84, 'BSI-DSZ-CC-0482-2008': 6, 'BSI-DSZ-CC-0322-2005': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 5, 'EAL4': 8, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 2, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL5': 6, 'EAL6': 4, 'EAL7': 4, 'EAL 5 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_SCP': 3, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.3': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 12, 'Infineon Technologies AG': 11, 'Infineon AG': 24, 'Infineon Technologies': 6}, 'Philips': {'Philips': 1}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 4}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 19}, '3DES': {'Triple-DES': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 22, 'RSA 2048': 28}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 52}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140': 1}, 'BSI': {'AIS 34': 3, 'AIS 31': 4, 'AIS 25': 3, 'AIS 26': 2, 'AIS 32': 1, 'AIS 35': 1, 'AIS 36': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'braries RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen': 1, '2 all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID': 1, 'braries RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÃœV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0322-2005': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 2}}, 'cc_security_level': {'EAL': {'EAL5': 5, 'EAL5+': 2, 'EAL 5': 4, 'EAL5 augmented': 2, 'EAL 5 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.3': 4, 'ACM_SCP': 3, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.3': 4, 'ADV_HLD.3': 3, 'ADV_IMP.2': 3, 'ADV_INT.1': 3, 'ADV_LLD.1': 3, 'ADV_RCR.2': 3, 'ADV_SPM.3': 2, 'ADV_FSP': 1, 'ADV_FSP.2': 1, 'ADV_SPM.1': 3}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.2': 4, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.3': 4, 'AVA_CCA.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.4': 3, 'AVA_SOF': 4}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 3}, 'FCS': {'FCS_RND.1': 3, 'FCS_COP.1': 43, 'FCS_CKM.1': 49, 'FCS_COP.1.1': 4, 'FCS_CKM.4': 30, 'FCS_CKM.1.1': 5, 'FCS_CKM.2': 7, 'FCS_CKM.4.1': 3, 'FCS_RND': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITT.1': 3, 'FDP_IFC.1': 14, 'FDP_ACC.1': 25, 'FDP_ACF.1': 14, 'FDP_SDI.1': 17, 'FDP_SDI.2': 14, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 24, 'FDP_ITC.2': 23, 'FDP_SDI.1.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1.1': 3, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 3, 'FDP_ITC.2.1': 3, 'FDP_ITC.2.2': 3, 'FDP_ITC.2.3': 3, 'FDP_ITC.2.4': 3, 'FDP_ITC.2.5': 3, 'FDP_CKM.2': 1}, 'FMT': {'FMT_LIM.1': 4, 'FMT_LIM.2': 4, 'FMT_MSA.3': 16, 'FMT_MSA.1': 16, 'FMT_SMF.1': 10, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 32, 'FMT_MSA.2.1': 3}, 'FPT': {'FPT_FLS.1': 6, 'FPT_SEP.1': 6, 'FPT_PHP.3': 4, 'FPT_ITT.1': 3, 'FPT_TST.2': 22, 'FPT_TST.1': 11, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 5, 'FPT_TDC.1': 3, 'FPT_TST': 2}, 'FRU': {'FRU_FLT.2': 6}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 2, 'Infineon': 2, 'Infineon Technologies AG': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 39}, '3DES': {'3DES': 21, 'Triple-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 19, 'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 14}, 'ECC': {'ECC': 47}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 4}, 'DSA': {'DSA': 15}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 7, 'RND': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'SPA': 5, 'DPA': 7}, 'FI': {'Malfunction': 15, 'malfunction': 2, 'DFA': 4}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS31': 9}, 'RFC': {'RFC2437': 3}, 'ISO': {'ISO/IEC 7816-3': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, '(single DES is out of scope of the evaluation': 1, '(key length below 1280 bit are out of scope of the evaluation': 1, '(key length below 192 bit are out of scope of the evaluation': 1, 'smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048': 1, 'bits key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key': 1, 'agreement according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894', 'st_pdf_hash': 'ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c', 'report_txt_hash': 'a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0', 'st_txt_hash': '900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 19}, 'rules_asymmetric_crypto': {'RSA2048': 22, 'RSA 2048': 28, 'ECDH': 2, 'ECDSA': 3, 'ECC': 52, 'DH': 2, 'Diffie-Hellman': 1, 'DSA': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 5}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'physical probing': 1, 'physical tampering': 1, 'SPA': 1, 'DPA': 2}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 18, '3DES': 21}, 'rules_asymmetric_crypto': {'RSA2048': 19, 'RSA 2048': 2, 'ECDH': 9, 'ECDSA': 14, 'ECC': 47, 'DH': 9, 'Diffie-Hellman': 4, 'DSA': 15}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 7, 'RND': 3}, 'rules_tee': {'SE': 4}, 'rules_side_channels': {'Malfunction': 15, 'malfunction': 2, 'Leak-Inherent': 11, 'Physical Probing': 2, 'SPA': 4, 'DPA': 7, 'DFA': 4, 'reverse engineering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.5', '1.1']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2011/80', 'ANSSI-CC-2011/79', 'BSI-DSZ-CC-0630-2010', 'ANSSI-CC-2011/13', 'ANSSI-CC-2011/16', 'ANSSI-CC-2011/12', 'BSI-DSZ-CC-0593-2009', 'ANSSI-CC-2011/10']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "e367ecaf05dacedb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0523-2008",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1",
        "1.5"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-3011"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2011/10",
          "BSI-DSZ-CC-0630-2010",
          "ANSSI-CC-2011/80",
          "ANSSI-CC-2011/16",
          "ANSSI-CC-2011/12",
          "ANSSI-CC-2011/79",
          "ANSSI-CC-2011/13",
          "BSI-DSZ-CC-0593-2009"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0482-2008",
          "BSI-DSZ-CC-0322-2005"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2011/13",
          "ANSSI-CC-2011/10",
          "BSI-DSZ-CC-0630-2010",
          "ANSSI-CC-2011/80",
          "ANSSI-CC-2011/16",
          "BSI-DSZ-CC-0784-2013",
          "ANSSI-CC-2011/12",
          "ANSSI-CC-2011/79",
          "BSI-DSZ-CC-0593-2009"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0482-2008",
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0169-2002",
          "BSI-DSZ-CC-0223-2003",
          "BSI-DSZ-CC-0399-2007",
          "BSI-DSZ-CC-0266-2005"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0630-2010"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0430-2008",
          "BSI-DSZ-CC-0482-2008",
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0266-2005"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0630-2010"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0430-2008",
          "BSI-DSZ-CC-0482-2008",
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0266-2005"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-06-09",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0523_ma1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software"
      }
    ]
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-11-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0523a.pdf",
    "report_frontpage": {
      "DE": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 52
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA 2048": 28,
          "RSA2048": 23
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0322-2005": 1,
          "BSI-DSZ-CC-0482-2008": 5,
          "BSI-DSZ-CC-0523": 2,
          "BSI-DSZ-CC-0523-2008": 22
        },
        "NL": {
          "CC-0437-2007": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 4
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 3,
          "ACM_SCP.3": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 2,
          "ALC_TAT.2": 1
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 5,
          "EAL 5": 4,
          "EAL 5 augmented": 3,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 7,
          "EAL5": 6,
          "EAL5+": 2,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of T\u00dcV Informationstechnik GmbH (confidential document) 8 specifically \u2022 AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen": 1,
          "RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of T\u00dcV Informationstechnik GmbH (confidential document) [11] Data Book \u2013 SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09": 1,
          "all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 3,
          "AIS 26": 2,
          "AIS 31": 4,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 1,
          "AIS 36": 1,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS140": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 12,
          "Infineon AG": 24,
          "Infineon Technologies": 6,
          "Infineon Technologies AG": 11
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20081117105441+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12,SLE66CLX1600PE / m1596-a12,SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12,SLE66CLX1440PEM / m2090-a12,SLE66CLX1440PE / m2091-a12,SLE66CLX1440PES / m2092-a12,SLE66CX1440PE / m2093-a12,SLE66CLX1280PEM / m2094-a12,SLE66CLX1280PE / m2095-a12,SLE66CLX1280PES / m2096-a12,SLE66CX1280PE / m2097-a12all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon Technologies AG, BSI-DSZ-CC-0523-2008, SmartCard Controller\"",
      "/ModDate": "D:20081120082435+01\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0523-2008",
      "pdf_file_size_bytes": 551749,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0523b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 47
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 14
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA2048": 19
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0266-2005": 1,
          "BSI-DSZ-CC-0322-2005": 1,
          "BSI-DSZ-CC-0430-2008": 1,
          "BSI-DSZ-CC-0482-2008": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 3,
          "ACM_SCP.2": 1,
          "ACM_SCP.3": 5
        },
        "ADO": {
          "ADO_DEL.2": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 5,
          "ADV_HLD.3": 3,
          "ADV_IMP.2": 3,
          "ADV_INT.1": 3,
          "ADV_LLD.1": 3,
          "ADV_RCR.2": 3,
          "ADV_SPM.1": 3,
          "ADV_SPM.3": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.2": 4,
          "ALC_LCD.2": 1,
          "ALC_TAT.2": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_CCA.1": 2,
          "AVA_MSU.3": 3,
          "AVA_SOF": 4,
          "AVA_SOF.1": 2,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 4,
          "EAL 5 augmented": 4,
          "EAL5": 5,
          "EAL5 augmented": 2,
          "EAL5+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM.1": 49,
          "FCS_CKM.1.1": 5,
          "FCS_CKM.2": 7,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 3,
          "FCS_COP.1": 45,
          "FCS_COP.1.1": 4,
          "FCS_RND": 2,
          "FCS_RND.1": 4,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 25,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 15,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_CKM.2": 1,
          "FDP_IFC.1": 14,
          "FDP_ITC.1": 24,
          "FDP_ITC.1.1": 3,
          "FDP_ITC.1.2": 3,
          "FDP_ITC.1.3": 3,
          "FDP_ITC.2": 23,
          "FDP_ITC.2.1": 3,
          "FDP_ITC.2.2": 3,
          "FDP_ITC.2.3": 3,
          "FDP_ITC.2.4": 3,
          "FDP_ITC.2.5": 3,
          "FDP_ITT.1": 3,
          "FDP_SDI.1": 17,
          "FDP_SDI.1.1": 1,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 4,
          "FMT_LIM.2": 4,
          "FMT_MSA.1": 15,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 32,
          "FMT_MSA.2.1": 3,
          "FMT_MSA.3": 16,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 9
        },
        "FPT": {
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 6,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 7,
          "FPT_SEP.1": 6,
          "FPT_TDC.1": 3,
          "FPT_TST": 2,
          "FPT_TST.1": 11,
          "FPT_TST.2": 26,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 6
        },
        "FTP": {
          "FTP_ITC.1": 3,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) \u2022 Advanced security sensors and physical countermeasures (e.g. shielding": 1,
          "key length (key length below 1280 bit are out of scope of the evaluation) \u2022 Signature creation and verification according to ECDSA standard and key": 1,
          "key length below 1280 bit are out of scope of the evaluation": 1,
          "key length below 192 bit are out of scope of the evaluation": 1,
          "out of scope": 3,
          "single DES is out of scope of the evaluation": 1,
          "smart card applications \u2022 Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) \u2022 Data encryption by the ACE module according to RSA standard with 512 to 2048": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 7
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 4,
          "Malfunction": 15,
          "malfunction": 3
        },
        "SCA": {
          "DPA": 6,
          "Leak-Inherent": 11,
          "Physical Probing": 2,
          "SPA": 4
        },
        "other": {
          "reverse engineering": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 9
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS PUB 46-3": 2
        },
        "ISO": {
          "ISO/IEC 7816": 6,
          "ISO/IEC 7816-3": 1
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC2437": 3
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 21,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 11
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Buchmueller Hans-Ulrich",
      "/CreationDate": "D:20081030093245Z",
      "/Creator": "Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word",
      "/Keywords": "\"Security Target,  contactless, dual interface, Security Controller, public, document, resistance to attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, RSA, Elliptic Curve, Libraries, Dresden, crypto\"",
      "/ModDate": "D:20081120082822+01\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Subject": "Security Target SLE66CLX1600PEx - SLE66CLX1400PEx - SLE66CLX1280PEx a12",
      "/Title": "CC EAL5+ Certification Security Target",
      "pdf_file_size_bytes": 442657,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0523a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_MSU.3",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0523b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894",
      "txt_hash": "a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c",
      "txt_hash": "900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981"
    }
  },
  "status": "archived"
}