| name |
THD89 1.0.3 Secure Element version 1.0 |
BlackBerry Smartphones with OS 10.3.3 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Mobility |
| scheme |
ES |
CA |
| status |
active |
archived |
| not_valid_after |
26.09.2028 |
09.01.2022 |
| not_valid_before |
26.09.2023 |
09.01.2017 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20CT%20v1.0e.docx |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20CR%20v1.1e.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20ST%20v1.10.pdf |
| manufacturer |
Tongxin Microelectronics Co., Ltd. |
Blackberry |
| manufacturer_web |
https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# |
https://www.blackberry.com/ |
| security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
{} |
| dgst |
f030b4c2adc03fa7 |
1cbd1fcffa8e2dcc |
| heuristics/cert_id |
2021-36-INF-4157 |
383-4-391 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:blackberry:blackberry_os:10.3.3:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ALC_TSU_EXT.2, ASE_ECD.1, ASE_OBJ.1, ALC_CMS.1, ASE_REQ.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
1.0, 1.0.3 |
10.3.3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 26.09.2023
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
- certification_date: 26.09.2023
- description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Tongxin Microelectronics Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
- type: Product
- manufacturer: Tongxin Microelectronics Co., Ltd.
- product: THD89 1.0.3 Secure Element version 1.0
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
b43e1d04965c0a49, 4fa8c549c1065310 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf |
| pdf_data/cert_filename |
2021-36_Certificado.pdf |
383-4-391 CT v1.0e.docx |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20230904141829+02'00'
- /ModDate: D:20230904141829+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 887800
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2021-36 INF-4157.pdf |
383-4-391 CR v1.1e.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-S-0201-2022: 1
- ES:
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 4
- FCS_RNG.1: 1
- FDP:
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: 9308
- /CreationDate: D:20230925160654+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230925160654+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 418348
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Clark, Cory P.
- /Company: CSEC
- /CreationDate: D:20170112145115-05'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /ModDate: D:20170112145141-05'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170112195105
- /Title: 383-4-XXX CR v0.1
- pdf_file_size_bytes: 198207
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
| pdf_data/st_filename |
2021-36 ST_lite.pdf |
383-4-391 ST v1.10.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL5: 4
- EAL5 augmented: 2
- EAL5+: 4
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 5
- ALC_TSU_EXT.1: 6
- ALC_TSU_EXT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 7
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
|
- FAU:
- FAU_ALT_EXT: 3
- FAU_ALT_EXT.2: 8
- FAU_ALT_EXT.2.1: 2
- FAU_ALT_EXT.2.2: 2
- FAU_ARP: 1
- FAU_ARP.1: 1
- FAU_GEN: 31
- FAU_STG: 2
- FAU_STG.1: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 37
- FCS_CKM.1.1: 2
- FCS_CKM.2: 17
- FCS_CKM.2.1: 2
- FCS_CKM.4: 19
- FCS_CKM_EXT.1: 8
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.1.2: 2
- FCS_CKM_EXT.1.3: 2
- FCS_CKM_EXT.1.4: 2
- FCS_CKM_EXT.2: 6
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 7
- FCS_CKM_EXT.3.1: 2
- FCS_CKM_EXT.3.2: 2
- FCS_CKM_EXT.4: 15
- FCS_CKM_EXT.4.1: 4
- FCS_CKM_EXT.4.2: 2
- FCS_CKM_EXT.5: 8
- FCS_CKM_EXT.5.1: 2
- FCS_CKM_EXT.5.2: 2
- FCS_CKM_EXT.6: 7
- FCS_CKM_EXT.6.1: 2
- FCS_COP: 1
- FCS_COP.1: 45
- FCS_COP.1.1: 5
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RBG_EXT.1.3: 2
- FCS_SRV_EXT: 4
- FCS_SRV_EXT.1: 8
- FCS_SRV_EXT.1.1: 2
- FCS_STG_EXT: 4
- FCS_STG_EXT.1: 10
- FCS_STG_EXT.1.1: 2
- FCS_STG_EXT.1.2: 3
- FCS_STG_EXT.1.3: 3
- FCS_STG_EXT.1.4: 3
- FCS_STG_EXT.1.5: 3
- FCS_STG_EXT.2: 15
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 2
- FCS_STG_EXT.3: 8
- FCS_STG_EXT.3.1: 2
- FCS_STG_EXT.3.2: 2
- FCS_STG_EXT.4: 7
- FCS_STG_EXT.4.1: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 2
- FCS_TLSC_EXT.1.5: 2
- FCS_TLSC_EXT.1.6: 1
- FCS_TLSC_EXT.2: 11
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FDP:
- FDP_ACC.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 2
- FDP_ACF_EXT.1: 8
- FDP_ACF_EXT.1.1: 2
- FDP_ACF_EXT.1.2: 2
- FDP_DAR_EXT: 3
- FDP_DAR_EXT.1: 8
- FDP_DAR_EXT.1.1: 2
- FDP_DAR_EXT.1.2: 2
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC_EXT.1: 8
- FDP_IFC_EXT.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT: 1
- FDP_ITT.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 7
- FDP_STG_EXT.1.1: 2
- FDP_UPC.1: 1
- FDP_UPC_EXT: 3
- FDP_UPC_EXT.1: 7
- FDP_UPC_EXT.1.1: 2
- FDP_UPC_EXT.1.2: 1
- FDP_UPC_EXT.2.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 2
- FIA_AFL_EXT.1: 7
- FIA_AFL_EXT.1.1: 2
- FIA_AFL_EXT.1.2: 2
- FIA_AFL_EXT.1.3: 2
- FIA_BLT_EXT: 3
- FIA_BLT_EXT.1: 8
- FIA_BLT_EXT.1.1: 2
- FIA_BLT_EXT.1.2: 2
- FIA_BLT_EXT.2: 9
- FIA_BLT_EXT.2.1: 2
- FIA_ENR_EXT: 3
- FIA_ENR_EXT.1: 3
- FIA_ENR_EXT.2: 5
- FIA_ENR_EXT.2.1: 2
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 8
- FIA_PAE_EXT.1.1: 2
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 2
- FIA_SOS: 1
- FIA_SOS.1: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 8
- FIA_TRT_EXT.1.1: 2
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.2: 4
- FIA_UAU.6: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 7
- FIA_UAU_EXT.1.1: 2
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UAU_EXT.2.2: 2
- FIA_UAU_EXT.3: 9
- FIA_UAU_EXT.3.1: 2
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 3
- FMT_MOF_EXT.1: 9
- FMT_MOF_EXT.1.1: 6
- FMT_MOF_EXT.1.2: 11
- FMT_MSA: 2
- FMT_MSA.2: 1
- FMT_POL_EXT: 3
- FMT_POL_EXT.2: 7
- FMT_POL_EXT.2.1: 2
- FMT_POL_EXT.2.2: 2
- FMT_SMF: 2
- FMT_SMF.1: 1
- FMT_SMF_EXT.1: 26
- FMT_SMF_EXT.1.1: 5
- FMT_SMF_EXT.2: 8
- FMT_SMF_EXT.2.1: 2
- FMT_SMF_EXT.3: 9
- FMT_SMF_EXT.3.1: 2
- FMT_SMF_EXT.3.2: 2
- FMT_UNR_EXT: 3
- FMT_UNR_EXT.1: 8
- FMT_UNR_EXT.1.1: 2
- FPT:
- FPT_AEX_EXT: 3
- FPT_AEX_EXT.1: 9
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 2
- FPT_AEX_EXT.2: 7
- FPT_AEX_EXT.2.1: 2
- FPT_AEX_EXT.2.2: 2
- FPT_AEX_EXT.3: 7
- FPT_AEX_EXT.3.1: 2
- FPT_AEX_EXT.4: 7
- FPT_AEX_EXT.4.1: 2
- FPT_AEX_EXT.4.2: 2
- FPT_BBD_EXT: 3
- FPT_BBD_EXT.1: 8
- FPT_BBD_EXT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 2
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 8
- FPT_KST_EXT.1.1: 2
- FPT_KST_EXT.2: 8
- FPT_KST_EXT.2.1: 2
- FPT_KST_EXT.3: 6
- FPT_KST_EXT.3.1: 2
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 8
- FPT_NOT_EXT.1.1: 2
- FPT_SSP: 1
- FPT_SSP.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST: 4
- FPT_TST.1: 2
- FPT_TST.1.1: 1
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 10
- FPT_TST_EXT.2.1: 2
- FPT_TST_EXT.2.2: 2
- FPT_TUD: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 2
- FPT_TUD_EXT.2.4: 2
- FRU:
- FTA:
- FTA_SSL: 3
- FTA_SSL.2: 1
- FTA_SSL.3: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.1.2: 2
- FTA_SSL_EXT.1.3: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 7
- FTA_WSE_EXT.1.1: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 1
- FTP_ITC_EXT.1: 10
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 7
- O.ECC: 6
- O.RND: 3
- O.RSA: 7
- O.TDES: 8
- T:
|
- A:
- A.CONFIG: 3
- A.CONNECT-: 1
- A.CONNECTIVITY: 1
- A.MOBILE: 1
- A.MOBILE_: 1
- A.MOBILE_DEVICE_PLATFORM: 1
- A.NOTIFY: 2
- A.PRECAUTION: 3
- A.PROPER: 2
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 2
- O:
- O.ACCOUNT-: 1
- O.ACCOUNTABILITY: 7
- O.APPLY_POLICY: 6
- O.AUTH: 14
- O.COMMS: 8
- O.CONFIG: 12
- O.DATA: 4
- O.DATA_PROTECTION_TRANSIT: 2
- O.INTEGRITY: 6
- O.STORAGE: 8
- OE:
- OE.CONFIG: 4
- OE.IT: 2
- OE.IT_ENTERPRISE: 2
- OE.MOBILE: 3
- OE.MOBILE_DEVICE_PLATFORM: 1
- OE.NOTIFY: 4
- OE.PRECAUTION: 4
- OE.PROPER: 5
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 4
- OE.WIRELESS: 3
- OE.WIRELESS_NETWORK: 1
- T:
- T.EAVESDROP: 3
- T.FLAWAPP: 2
- T.MALICIOUS: 2
- T.MALICIOUS_APPS: 1
- T.NETWORK: 5
- T.NETWORK_: 1
- T.NETWORK_ATTACK: 1
- T.PERSISTENT: 3
- T.PHYSICAL: 4
- T.PHYSICAL_ACCESS: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 29
- Triple-DES: 3
- DES:
|
- AES_competition:
- AES:
- AES: 24
- AES-: 1
- AES-256: 2
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 2
- HMAC: 2
- HMAC-SHA-256: 6
- HMAC-SHA-384: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 3
- SHA-512: 3
- SHA256: 8
- SHA384: 1
- SHA512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 46
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 5
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP256r1: 1
- brainpoolP320r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 4
- secp384r1: 4
- secp521r1: 3
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 8
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 8
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 3
- physical tampering: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- side channel: 1
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- RFC:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 3
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-108: 2
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38C: 2
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 3
- NIST SP 800-57: 2
- SP 800-108: 2
- SP 800-38A: 9
- SP 800-38B: 1
- SP 800-38C: 2
- SP 800-38D: 3
- SP 800-38E: 2
- SP 800-38F: 3
- SP 800-90: 2
- PKCS:
- RFC:
- RFC 2560: 3
- RFC 2818: 2
- RFC 3394: 1
- RFC 4346: 2
- RFC 4492: 8
- RFC 5246: 22
- RFC 5280: 4
- RFC 5289: 9
- RFC 5759: 1
- RFC 6125: 3
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20230627103637+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230627103637+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 780001
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Teresa MacArthur
- /Client Full Name: BlackBerry
- /Client Short Name: BlackBerry
- /Company: EWA-Canada
- /CreationDate: D:20170109100153-05'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Document Number: 1958-001-D102
- /ModDate: D:20170109100222-05'00'
- /Producer: Adobe PDF Library 10.0
- /ST_Date: 9 January 2017
- /ST_Title: BlackBerry Smartphones with OS 10.3.3
- /ST_Version: 1.10
- /SourceModified: D:20170109145044
- /Title: Security Target
- pdf_file_size_bytes: 1152818
- pdf_hyperlinks: http://www.blackberry.com/bbsirt/
- pdf_is_encrypted: False
- pdf_number_of_pages: 164
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |