Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
THD89 1.0.3 Secure Element version 1.0
2021-36-INF-4157
BlackBerry Smartphones with OS 10.3.3
383-4-391
name THD89 1.0.3 Secure Element version 1.0 BlackBerry Smartphones with OS 10.3.3
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
scheme ES CA
status active archived
not_valid_after 26.09.2028 09.01.2022
not_valid_before 26.09.2023 09.01.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20CT%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20CR%20v1.1e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-391%20ST%20v1.10.pdf
manufacturer Tongxin Microelectronics Co., Ltd. Blackberry
manufacturer_web https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# https://www.blackberry.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 {}
dgst f030b4c2adc03fa7 1cbd1fcffa8e2dcc
heuristics/cert_id 2021-36-INF-4157 383-4-391
heuristics/cpe_matches {} cpe:2.3:o:blackberry:blackberry_os:10.3.3:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ALC_TSU_EXT.2, ASE_ECD.1, ASE_OBJ.1, ALC_CMS.1, ASE_REQ.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 1.0, 1.0.3 10.3.3
heuristics/report_references/directly_referenced_by NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR {}
heuristics/report_references/indirectly_referenced_by NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR {}
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 26.09.2023
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
    • certification_date: 26.09.2023
    • description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Tongxin Microelectronics Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
    • type: Product
  • manufacturer: Tongxin Microelectronics Co., Ltd.
  • product: THD89 1.0.3 Secure Element version 1.0
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
heuristics/protection_profiles cf0f01bcd7be3e9c b43e1d04965c0a49, 4fa8c549c1065310
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf
pdf_data/cert_filename 2021-36_Certificado.pdf 383-4-391 CT v1.0e.docx
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230904141829+02'00'
  • /ModDate: D:20230904141829+02'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 887800
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2021-36 INF-4157.pdf 383-4-391 CR v1.1e.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-S-0201-2022: 1
  • ES:
    • 2021-36-INF-4157- v1: 1
  • CA:
    • 383-4-391: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 4
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
  • EWA:
    • EWA-Canada: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 4
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP512r1: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.1.0: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 4
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: 9308
  • /CreationDate: D:20230925160654+02'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20230925160654+02'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 418348
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Clark, Cory P.
  • /Company: CSEC
  • /CreationDate: D:20170112145115-05'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /ModDate: D:20170112145141-05'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20170112195105
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 198207
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 2021-36 ST_lite.pdf 383-4-391 ST v1.10.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 4
    • EAL5 augmented: 2
    • EAL5+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT: 5
    • ALC_TSU_EXT.1: 6
    • ALC_TSU_EXT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 34
    • FCS_COP.1.1: 4
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_ITT.1: 7
    • FDP_SDC.1: 6
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 7
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FAU:
    • FAU_ALT_EXT: 3
    • FAU_ALT_EXT.2: 8
    • FAU_ALT_EXT.2.1: 2
    • FAU_ALT_EXT.2.2: 2
    • FAU_ARP: 1
    • FAU_ARP.1: 1
    • FAU_GEN: 31
    • FAU_STG: 2
    • FAU_STG.1: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 37
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 17
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 19
    • FCS_CKM_EXT.1: 8
    • FCS_CKM_EXT.1.1: 2
    • FCS_CKM_EXT.1.2: 2
    • FCS_CKM_EXT.1.3: 2
    • FCS_CKM_EXT.1.4: 2
    • FCS_CKM_EXT.2: 6
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 7
    • FCS_CKM_EXT.3.1: 2
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 15
    • FCS_CKM_EXT.4.1: 4
    • FCS_CKM_EXT.4.2: 2
    • FCS_CKM_EXT.5: 8
    • FCS_CKM_EXT.5.1: 2
    • FCS_CKM_EXT.5.2: 2
    • FCS_CKM_EXT.6: 7
    • FCS_CKM_EXT.6.1: 2
    • FCS_COP: 1
    • FCS_COP.1: 45
    • FCS_COP.1.1: 5
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 19
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_RBG_EXT.1.3: 2
    • FCS_SRV_EXT: 4
    • FCS_SRV_EXT.1: 8
    • FCS_SRV_EXT.1.1: 2
    • FCS_STG_EXT: 4
    • FCS_STG_EXT.1: 10
    • FCS_STG_EXT.1.1: 2
    • FCS_STG_EXT.1.2: 3
    • FCS_STG_EXT.1.3: 3
    • FCS_STG_EXT.1.4: 3
    • FCS_STG_EXT.1.5: 3
    • FCS_STG_EXT.2: 15
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 2
    • FCS_STG_EXT.3: 8
    • FCS_STG_EXT.3.1: 2
    • FCS_STG_EXT.3.2: 2
    • FCS_STG_EXT.4: 7
    • FCS_STG_EXT.4.1: 2
    • FCS_TLSC_EXT: 4
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 2
    • FCS_TLSC_EXT.1.5: 2
    • FCS_TLSC_EXT.1.6: 1
    • FCS_TLSC_EXT.2: 11
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.2.2: 2
    • FCS_TLSC_EXT.2.3: 2
    • FCS_TLSC_EXT.2.4: 2
    • FCS_TLSC_EXT.2.5: 2
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 2
    • FDP_ACF_EXT.1: 8
    • FDP_ACF_EXT.1.1: 2
    • FDP_ACF_EXT.1.2: 2
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 8
    • FDP_DAR_EXT.1.1: 2
    • FDP_DAR_EXT.1.2: 2
    • FDP_IFC: 2
    • FDP_IFC.1: 1
    • FDP_IFC_EXT.1: 8
    • FDP_IFC_EXT.1.1: 2
    • FDP_IFF.1: 1
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITT: 1
    • FDP_ITT.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 7
    • FDP_STG_EXT.1.1: 2
    • FDP_UPC.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 7
    • FDP_UPC_EXT.1.1: 2
    • FDP_UPC_EXT.1.2: 1
    • FDP_UPC_EXT.2.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 2
    • FIA_AFL_EXT.1: 7
    • FIA_AFL_EXT.1.1: 2
    • FIA_AFL_EXT.1.2: 2
    • FIA_AFL_EXT.1.3: 2
    • FIA_BLT_EXT: 3
    • FIA_BLT_EXT.1: 8
    • FIA_BLT_EXT.1.1: 2
    • FIA_BLT_EXT.1.2: 2
    • FIA_BLT_EXT.2: 9
    • FIA_BLT_EXT.2.1: 2
    • FIA_ENR_EXT: 3
    • FIA_ENR_EXT.1: 3
    • FIA_ENR_EXT.2: 5
    • FIA_ENR_EXT.2.1: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 8
    • FIA_PAE_EXT.1.1: 2
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 7
    • FIA_PMG_EXT.1.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 8
    • FIA_TRT_EXT.1.1: 2
    • FIA_UAU: 6
    • FIA_UAU.1: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.1: 7
    • FIA_UAU_EXT.1.1: 2
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 2
    • FIA_UAU_EXT.3: 9
    • FIA_UAU_EXT.3.1: 2
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 3
    • FMT_MOF_EXT.1: 9
    • FMT_MOF_EXT.1.1: 6
    • FMT_MOF_EXT.1.2: 11
    • FMT_MSA: 2
    • FMT_MSA.2: 1
    • FMT_POL_EXT: 3
    • FMT_POL_EXT.2: 7
    • FMT_POL_EXT.2.1: 2
    • FMT_POL_EXT.2.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
    • FMT_SMF_EXT.1: 26
    • FMT_SMF_EXT.1.1: 5
    • FMT_SMF_EXT.2: 8
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 9
    • FMT_SMF_EXT.3.1: 2
    • FMT_SMF_EXT.3.2: 2
    • FMT_UNR_EXT: 3
    • FMT_UNR_EXT.1: 8
    • FMT_UNR_EXT.1.1: 2
  • FPT:
    • FPT_AEX_EXT: 3
    • FPT_AEX_EXT.1: 9
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 2
    • FPT_AEX_EXT.2: 7
    • FPT_AEX_EXT.2.1: 2
    • FPT_AEX_EXT.2.2: 2
    • FPT_AEX_EXT.3: 7
    • FPT_AEX_EXT.3.1: 2
    • FPT_AEX_EXT.4: 7
    • FPT_AEX_EXT.4.1: 2
    • FPT_AEX_EXT.4.2: 2
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 8
    • FPT_BBD_EXT.1.1: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 2
    • FPT_KST_EXT: 3
    • FPT_KST_EXT.1: 8
    • FPT_KST_EXT.1.1: 2
    • FPT_KST_EXT.2: 8
    • FPT_KST_EXT.2.1: 2
    • FPT_KST_EXT.3: 6
    • FPT_KST_EXT.3.1: 2
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 8
    • FPT_NOT_EXT.1.1: 2
    • FPT_SSP: 1
    • FPT_SSP.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST: 4
    • FPT_TST.1: 2
    • FPT_TST.1.1: 1
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TST_EXT.2.1: 2
    • FPT_TST_EXT.2.2: 2
    • FPT_TUD: 2
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
    • FPT_TUD_EXT.2.3: 2
    • FPT_TUD_EXT.2.4: 2
  • FRU:
    • FRU_PRS: 1
    • FRU_PRS.2: 1
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.2: 1
    • FTA_SSL.3: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 2
    • FTA_SSL_EXT.1.2: 2
    • FTA_SSL_EXT.1.3: 2
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 1
    • FTA_TSE.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 7
    • FTA_WSE_EXT.1.1: 2
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 1
    • FTP_ITC_EXT.1: 10
    • FTP_ITC_EXT.1.1: 2
    • FTP_ITC_EXT.1.2: 2
    • FTP_ITC_EXT.1.3: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 7
    • O.ECC: 6
    • O.RND: 3
    • O.RSA: 7
    • O.TDES: 8
  • T:
    • T.RND: 2
  • A:
    • A.CONFIG: 3
    • A.CONNECT-: 1
    • A.CONNECTIVITY: 1
    • A.MOBILE: 1
    • A.MOBILE_: 1
    • A.MOBILE_DEVICE_PLATFORM: 1
    • A.NOTIFY: 2
    • A.PRECAUTION: 3
    • A.PROPER: 2
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNT-: 1
    • O.ACCOUNTABILITY: 7
    • O.APPLY_POLICY: 6
    • O.AUTH: 14
    • O.COMMS: 8
    • O.CONFIG: 12
    • O.DATA: 4
    • O.DATA_PROTECTION_TRANSIT: 2
    • O.INTEGRITY: 6
    • O.STORAGE: 8
  • OE:
    • OE.CONFIG: 4
    • OE.IT: 2
    • OE.IT_ENTERPRISE: 2
    • OE.MOBILE: 3
    • OE.MOBILE_DEVICE_PLATFORM: 1
    • OE.NOTIFY: 4
    • OE.PRECAUTION: 4
    • OE.PROPER: 5
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 4
    • OE.WIRELESS: 3
    • OE.WIRELESS_NETWORK: 1
  • T:
    • T.EAVESDROP: 3
    • T.FLAWAPP: 2
    • T.MALICIOUS: 2
    • T.MALICIOUS_APPS: 1
    • T.NETWORK: 5
    • T.NETWORK_: 1
    • T.NETWORK_ATTACK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 4
    • T.PHYSICAL_ACCESS: 1
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 4
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 29
      • Triple-DES: 3
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 24
      • AES-: 1
      • AES-256: 2
  • DES:
    • 3DES:
      • TDES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 2
      • HMAC: 2
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 33
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 19
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 9
    • ECIES:
      • ECIES: 1
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • PBKDF:
    • PBKDF: 7
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 3
      • SHA256: 8
      • SHA384: 1
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • PKE:
    • PKE: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 14
  • TLS:
    • DTLS:
      • DTLS: 4
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 46
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 5
  • VPN:
    • VPN: 29
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 6
  • TRNG:
    • TRNG: 3
  • PRNG:
    • DRBG: 14
    • PRNG: 2
  • RNG:
    • RBG: 16
    • RNG: 5
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 8
  • CBC:
    • CBC: 11
  • CCM:
    • CCM: 5
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 10
  • OFB:
    • OFB: 2
  • XEX:
    • XEX: 3
  • XTS:
    • XTS: 4
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 3
    • brainpoolP256r1: 1
    • brainpoolP320r1: 3
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 8
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 8
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 2.1.0: 2
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 4
    • side channel: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • ARM:
    • TrustZone: 7
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS26: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 6
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-67: 1
  • RFC:
    • RFC 5639: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-108: 2
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 3
    • NIST SP 800-57: 2
    • SP 800-108: 2
    • SP 800-38A: 9
    • SP 800-38B: 1
    • SP 800-38C: 2
    • SP 800-38D: 3
    • SP 800-38E: 2
    • SP 800-38F: 3
    • SP 800-90: 2
  • PKCS:
    • PKCS#7: 5
  • RFC:
    • RFC 2560: 3
    • RFC 2818: 2
    • RFC 3394: 1
    • RFC 4346: 2
    • RFC 4492: 8
    • RFC 5246: 22
    • RFC 5280: 4
    • RFC 5289: 9
    • RFC 5759: 1
    • RFC 6125: 3
  • X509:
    • X.509: 4
pdf_data/st_keywords/javacard_packages
  • com:
    • com.blackberry.xyz: 1
pdf_data/st_metadata
  • /CreationDate: D:20230627103637+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230627103637+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 780001
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Teresa MacArthur
  • /Client Full Name: BlackBerry
  • /Client Short Name: BlackBerry
  • /Company: EWA-Canada
  • /CreationDate: D:20170109100153-05'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Document Number: 1958-001-D102
  • /ModDate: D:20170109100222-05'00'
  • /Producer: Adobe PDF Library 10.0
  • /ST_Date: 9 January 2017
  • /ST_Title: BlackBerry Smartphones with OS 10.3.3
  • /ST_Version: 1.10
  • /SourceModified: D:20170109145044
  • /Title: Security Target
  • pdf_file_size_bytes: 1152818
  • pdf_hyperlinks: http://www.blackberry.com/bbsirt/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 164
state/cert/convert_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different