Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BlackBerry® Enterprise Server Version 5.0.0
383-4-100
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-2013
name BlackBerry® Enterprise Server Version 5.0.0 Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA DE
not_valid_after 28.09.2015 09.09.2014
not_valid_before 12.03.2010 22.02.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827b_pdf.pdf
manufacturer Research In Motion Limited Infineon Technologies AG
manufacturer_web https://www.rim.com/ https://www.infineon.com/
security_level EAL4+, ALC_FLR.1 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 1999de0c48802e38 cac36ad3c18fbc02
heuristics/cert_id 383-4-100 BSI-DSZ-CC-0827-2013
heuristics/cert_lab CANADA BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 5.0.0 1.03.006, 1.01.0008
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0827-V2-2014
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0791-2012
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, CSEC2014007, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0946-V3-2017, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V9-2024, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V6-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0791-2012
heuristics/protection_profiles {} f6d23054061d72ba
maintenance_updates

protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename blackberry-smart-v50-cert-eng.pdf 0827a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • CA:
    • cert_id: 383-4-100-CR
    • cert_lab: CANADA
  • DE:
    • cert_id: BSI-DSZ-CC-0827-2013
    • cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-100: 1
    • 383-4-100-CR: 1
  • DE:
    • BSI-DSZ-CC-0791-2012: 3
    • BSI-DSZ-CC-0827-2013: 23
    • BSI-DSZ-CC-S-0007-2011: 1
    • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL 4+: 3
  • EAL:
    • EAL 4: 3
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_VAL_EXP.1: 1
  • FDP:
    • FDP_SDP_EXP.1: 1
    • FDP_SDP_EXP.2: 1
  • FTA:
    • FTA_SSL_EXP.4: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 17
    • Infineon Technologies AG: 22
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 3
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 6
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 2
    • AIS32: 1
    • AIS47: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21 including optional Software Libraries RSA - EC –: 1
    • Software Libraries RSA - EC – Toolbox – FTL, Version 1.3, 2013-01-22, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A21 including optional Software Libraries RSA - EC – Toolbox – FTL: 1
    • for the M9900 A21 with Crypto Libraries, Version 3, 2013-02-08, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 3, 2013-02-08: 1
    • – FTL, Version 0.4, 2013-01-18, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: 24 February 2010
  • /CR_Version: 0.3
  • /Client City: Waterloo
  • /Client Country: Canada
  • /Client Full Name: Research In Motion Limited
  • /Client Postal Code: N2L 3W8
  • /Client Short Name: RIM
  • /Client State: Ontario
  • /Client Street: 295 Phillip Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company:
  • /CreationDate: D:20101014092443-04'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Developer Long Name: Research In Motion Limited
  • /Developer Short Name: RIM
  • /EAL Level: 4+
  • /EAL Level Base: 4
  • /EAL Long: EAL 4 Augmented
  • /EAL Short: EAL 4+
  • /ETPlan_Doc#: 1603-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 0.3
  • /ETPlan_date: 24 February 2010
  • /ETProcRes_Date: 24 February 2010
  • /ETProcRes_Doc#: 1603-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.3
  • /ETProc_Date: 24 Februrary 2010
  • /ETProc_Doc#: 1603-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: 0.3
  • /ETReport_Date: 24 February 2010
  • /ETReport_Doc#: 1603-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 0.5
  • /EWP_Date: 15 July 2008
  • /EWP_Doc#: 1603-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.1
  • /Eval number: 383-4-100
  • /Eval_End_Date: [dd month yyyy (date on certificate)]
  • /Eval_Start_Date: 18 July 2008
  • /Keywords:
  • /LeadEvaluator: S. Jackson
  • /LeadEvaluatorInitials: SJ
  • /Manager:
  • /ModDate: D:20101014092605-04'00'
  • /Producer: Acrobat Distiller 9.2.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1603
  • /ST_Date: 11 February 2010
  • /ST_Title: Security Target BlackBerry® Smartphone Version 5.0
  • /ST_Version: 4.0
  • /SVC_Date: 1 December 2008
  • /SVC_Doc#: 1603-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 30 March 2009
  • /SVR_Doc#: 1603-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 0.3
  • /SV_City: Waterloo
  • /Security Classification: EWA-Canada & RIM Proprietary
  • /SourceModified: D:20101014132425
  • /Sponsor: Research In Motion Limited
  • /Sponsor City: Waterloo
  • /Sponsor Country: Canada
  • /Sponsor Postal Code: N2L 3W8
  • /Sponsor State: Ontario
  • /Sponsor Street: 295 Phillip Street
  • /Subject:
  • /TOE: BlackBerry® Smartphone
  • /TOE Line1: [TOE Line1 - enter later for PCR or web page]
  • /TOE Line2: [TOE Line2 - enter later for PCR or web page]
  • /TOE Line3: [TOE Line3 - enter later for PCR or web page]
  • /TOE Line4: [TOE Line4 - enter later for PCR or web page]
  • /TOE Line5: [TOE Line5 - enter later for PCR or web page]
  • /TOE Short: BlackBerry® Smartphone
  • /TOE Short with version: BlackBerry® Smartphone
  • /TOE Short-NoTM: BlackBerry Smartphone
  • /TOE Version: 5.0
  • /TOE with version: BlackBerry® Smartphone Version 5.0
  • /TOE-NoTM: BlackBerry Smartphone
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: 500818796
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: RIM CPL post update ... rick
  • /_ReviewingToolsShownOnce:
  • pdf_file_size_bytes: 94281
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130311160734+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
  • /ModDate: D:20130311161303+01'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0827-2013
  • pdf_file_size_bytes: 1235472
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.bsi.bund.de/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
pdf_data/st_filename blackberry-smart-v50-sec-eng.pdf 0827b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 2
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL5: 6
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.3: 6
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 4
    • ALC_CMS.1: 1
    • ALC_CMS.4: 3
    • ALC_DEL.1: 4
    • ALC_DVS.1: 5
    • ALC_FLR.1: 8
    • ALC_LCD.1: 5
    • ALC_TAT.1: 5
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 6
    • ASE_INT.1: 5
    • ASE_OBJ.2: 6
    • ASE_REQ.1: 1
    • ASE_REQ.2: 3
    • ASE_SPD.1: 5
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_DPT.2: 1
    • ATE_FUN.1: 7
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.3: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 20
    • FCS_COP.1.1: 1
    • FCS_VAL_EXP.1: 12
    • FCS_VAL_EXP.1.1: 2
  • FDP:
    • FDP_ACC.1: 38
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 5
    • FDP_ETC.2: 7
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 3
    • FDP_IFC.1: 91
    • FDP_IFC.1.1: 9
    • FDP_IFF: 1
    • FDP_IFF.1: 79
    • FDP_IFF.1.1: 9
    • FDP_IFF.1.2: 8
    • FDP_IFF.1.3: 16
    • FDP_IFF.1.4: 16
    • FDP_IFF.1.5: 8
    • FDP_ITC.1: 6
    • FDP_ITC.2: 11
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 3
    • FDP_SDP_EXP.1: 14
    • FDP_SDP_EXP.1.1: 2
    • FDP_SDP_EXP.2: 13
    • FDP_SDP_EXP.2.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 48
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 61
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_SAE.1: 7
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 3
    • FPT_TDC.1.2: 3
  • FTA:
    • FTA_SSL.1: 11
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 6
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL_EXP.4: 15
    • FTA_SSL_EXP.4.1: 2
    • FTA_SSL_EXP.4.2: 2
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 31
    • FCS_CKM.2: 5
    • FCS_CKM.4: 23
    • FCS_COP: 47
    • FCS_COP.1: 27
    • FCS_RNG: 12
    • FCS_RNG.1: 30
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_ITT.1: 13
    • FDP_PHP.3: 1
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 16
    • FPT_ITT.1: 13
    • FPT_LIM.2: 1
    • FPT_PHP.3: 14
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 36
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 2
    • Infineon Technologies AG: 19
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-: 1
      • AES-256: 8
    • RC:
      • RC2: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • 3DES:
      • 3DES: 17
      • Triple-DES: 3
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 17
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • MD:
    • MD5:
      • MD5: 47
  • SHA:
    • SHA1:
      • SHA1: 47
    • SHA2:
      • SHA256: 47
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 12
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 6
    • Side-channel: 1
    • Timing Attack: 1
    • physical probing: 1
    • side channel: 6
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 13
    • FIPS 186-2: 8
    • FIPS 197: 1
    • FIPS 46-3: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 11
pdf_data/st_metadata
  • /Author: Jürgen Noller
  • /CreationDate: D:20130128081309
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria, chip card, secure controller, EAL5+, augmented, AVA_VAM.5, protection profile 0035
  • /ModDate: D:20130128081309
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 885361
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different