This page was not yet optimized for use on mobile
devices.
U.S. Government Family of Protection Profiles for Public Key Enabled Applications, Version 2.6.1
Web information
| Status | archived |
|---|---|
| Valid from | 31.07.2004 |
| Valid until | 21.03.2008 |
| Scheme | 🇺🇸 US |
| Category | Key Management Systems |
| Security level | EAL3+ |
Certification report
certification report file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Protection Profile
Extracted keywords
Symmetric Algorithms
HMACAsymmetric Algorithms
ECDH, DH, DSASchemes
PKE, Key AgreementProtocols
SSL, TLSSecurity level
EAL 3, EAL 4, EAL3, EAL4, EAL 3 augmented, EAL 4 augmentedClaims
O.DAC, T.DOS_OCSP, T.DOS_CRL, T.DOS_OSCPSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.1, ADO_IGS.1, ADO_DEL.2, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_HLD.1, ADV_FSP.2, ADV_IMP.1, ADV_LLD.1, ADV_SPM.1, ADV_IMP.2, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MSU.2, AVA_VLA.2, APE_OBJ, APE_REQSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_CRM_FPS.1, FCS_CRM_FPS.1.1, FCS_CRM_FPS.1.2, FDP_ACC.1, FDP_ACF.1, FDP_CPD.1, FDP_DAU_CRL.1, FDP_DAU_ENC.1, FDP_DAU_ENC.2, FDP_DAU_ENC.3, FDP_DAU_OCS.1, FDP_DAU_SIG.1, FDP_ETC_ENC.1, FDP_ETC_ENC.2, FDP_ETC_SIG.1, FDP_ITC_ENC.1, FDP_ITC_ENC.2, FDP_ITC_SIG.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CPD.1.1, FDP_CPD.1.2, FDP_CPD.1.3, FDP_CPD.1.4, FDP_ETC_SIG.1.1, FDP_ETC_SIG.1.2, FDP_ITC_SIG.1.1, FDP_DAU_SIG.1.1, FDP_DAU_SIG.1.2, FDP_DAU_SIG.1.3, FDP_ETC_ENC.1.1, FDP_ETC_ENC.1.2, FDP_DAU_ENC.1.1, FDP_DAU_ENC.1.2, FDP_ETC_ENC.2.2, FDP_ETC_ENC.2.3, FDP_DAU_ENC.2.1, FDP_DAU_ENC.2.2, FDP_ITC_ENC.1.1, FDP_ITC_ENC.2.2, FDP_ITC_ENC.2.3, FDP_DAU_ENC.3.1, FDP_DAU_ENC.3.2, FDP_DAU_OCS.1.1, FDP_DAU_OCS.1.2, FDP_DAU_OCS.1.3, FDP_DAU_OCS.1.4, FDP_DAU_OCS.1.5, FDP_DAU_OCS.1.6, FDP_DAU_OCS.1.7, FDP_DAU_OCS.1.8, FDP_DAU_OCS.1.9, FDP_DAU_CRL.1.1, FDP_DAU_CRL.1.2, FDP_DAU_CRL.1.3, FDP_DAU_CRL.1.4, FDP_DAU_CRL.1.5, FDP_DAU_CRL.1.6, FDP_DAU_CRL.1.7, FDP_DAU_CRL.1.8, FDP_DAU_CRL.1.9, FIA_UAU.1.1, FIA_UAU, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_UAU_SIG.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_SOS, FIA_UAU_SIG.1.1, FIA_UAU_SIG.1.2, FIA_UAU_SIG.1.3, FIA_UID, FIA_UAU.6.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MSA.1.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1Side-channel analysis
side channelCertification process
out of scope, Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) areStandards
FIPS 140, FIPS 140-2, FIPS 196, PKCS 7, RFC 3280, RFC 2560, RFC-822, ISO/IEC 15408, X.509File metadata
| Title | Introduction |
|---|---|
| Author | Jean Petty |
| Creation date | D:20041028103242-04'00' |
| Modification date | D:20041028103559-03'00' |
| Pages | 147 |
| Creator | Acrobat PDFMaker 5.0 for Word |
| Producer | Acrobat Distiller 5.0.5 (Windows) |
References
No references are available for this protection profile.
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "1b9700551307383a",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "1b9700551307383a",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_pke_2.6.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 8
}
},
"FF": {
"DH": {
"DH": 8
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.DAC": 10
},
"T": {
"T.DOS_CRL": 4,
"T.DOS_OCSP": 2,
"T.DOS_OSCP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 9,
"ACM_CAP.3": 20,
"ACM_CAP.4": 19,
"ACM_SCP.1": 4,
"ACM_SCP.2": 4
},
"ADO": {
"ADO_DEL.1": 6,
"ADO_DEL.2": 8,
"ADO_IGS.1": 16
},
"ADV": {
"ADV_FSP.1": 26,
"ADV_FSP.2": 10,
"ADV_HLD.1": 5,
"ADV_HLD.2": 29,
"ADV_IMP.1": 7,
"ADV_IMP.2": 2,
"ADV_LLD.1": 17,
"ADV_RCR.1": 16,
"ADV_SPM.1": 9
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 33,
"AGD_USR.1": 28
},
"ALC": {
"ALC_DVS.1": 16,
"ALC_FLR.1": 21,
"ALC_LCD.1": 7,
"ALC_TAT.1": 9
},
"APE": {
"APE_OBJ": 1,
"APE_REQ": 1
},
"ATE": {
"ATE_COV.2": 12,
"ATE_DPT.1": 10,
"ATE_FUN.1": 25,
"ATE_IND.2": 16
},
"AVA": {
"AVA_MSU.1": 10,
"AVA_MSU.2": 13,
"AVA_SOF.1": 12,
"AVA_VLA.1": 9,
"AVA_VLA.2": 12
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 63,
"EAL 3 augmented": 22,
"EAL 4": 63,
"EAL 4 augmented": 52,
"EAL3": 3,
"EAL4": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SEL.1": 5,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_COP.1": 5,
"FCS_CRM_FPS.1": 23,
"FCS_CRM_FPS.1.1": 1,
"FCS_CRM_FPS.1.2": 1
},
"FDP": {
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_CPD.1": 6,
"FDP_CPD.1.1": 1,
"FDP_CPD.1.2": 2,
"FDP_CPD.1.3": 2,
"FDP_CPD.1.4": 1,
"FDP_DAU_CRL.1": 13,
"FDP_DAU_CRL.1.1": 1,
"FDP_DAU_CRL.1.2": 1,
"FDP_DAU_CRL.1.3": 1,
"FDP_DAU_CRL.1.4": 1,
"FDP_DAU_CRL.1.5": 1,
"FDP_DAU_CRL.1.6": 1,
"FDP_DAU_CRL.1.7": 1,
"FDP_DAU_CRL.1.8": 1,
"FDP_DAU_CRL.1.9": 1,
"FDP_DAU_ENC.1": 4,
"FDP_DAU_ENC.1.1": 1,
"FDP_DAU_ENC.1.2": 1,
"FDP_DAU_ENC.2": 6,
"FDP_DAU_ENC.2.1": 1,
"FDP_DAU_ENC.2.2": 1,
"FDP_DAU_ENC.3": 5,
"FDP_DAU_ENC.3.1": 1,
"FDP_DAU_ENC.3.2": 1,
"FDP_DAU_OCS.1": 15,
"FDP_DAU_OCS.1.1": 1,
"FDP_DAU_OCS.1.2": 1,
"FDP_DAU_OCS.1.3": 1,
"FDP_DAU_OCS.1.4": 1,
"FDP_DAU_OCS.1.5": 1,
"FDP_DAU_OCS.1.6": 1,
"FDP_DAU_OCS.1.7": 1,
"FDP_DAU_OCS.1.8": 1,
"FDP_DAU_OCS.1.9": 1,
"FDP_DAU_SIG.1": 5,
"FDP_DAU_SIG.1.1": 1,
"FDP_DAU_SIG.1.2": 1,
"FDP_DAU_SIG.1.3": 1,
"FDP_ETC_ENC.1": 9,
"FDP_ETC_ENC.1.1": 1,
"FDP_ETC_ENC.1.2": 1,
"FDP_ETC_ENC.2": 8,
"FDP_ETC_ENC.2.2": 1,
"FDP_ETC_ENC.2.3": 1,
"FDP_ETC_SIG.1": 6,
"FDP_ETC_SIG.1.1": 1,
"FDP_ETC_SIG.1.2": 1,
"FDP_ITC_ENC.1": 7,
"FDP_ITC_ENC.1.1": 1,
"FDP_ITC_ENC.2": 10,
"FDP_ITC_ENC.2.2": 1,
"FDP_ITC_ENC.2.3": 1,
"FDP_ITC_SIG.1": 6,
"FDP_ITC_SIG.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_UAU": 11,
"FIA_UAU.1": 17,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 6,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 2,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_SIG.1": 5,
"FIA_UAU_SIG.1.1": 1,
"FIA_UAU_SIG.1.2": 1,
"FIA_UAU_SIG.1.3": 1,
"FIA_UID": 1,
"FIA_UID.1": 23,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.2": 6,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 6,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 17,
"FPT_STM.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 82
},
"PKE": {
"PKE": 176
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 26,
"FIPS 140-2": 1,
"FIPS 196": 1
},
"ISO": {
"ISO/IEC 15408": 4
},
"PKCS": {
"PKCS 7": 7
},
"RFC": {
"RFC 2560": 3,
"RFC 3280": 1,
"RFC-822": 2
},
"X509": {
"X.509": 22
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC": 10
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Jean Petty",
"/CreationDate": "D:20041028103242-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20041028103559-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Introduction",
"pdf_file_size_bytes": 2174646,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 147
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "4d8a1c424d077361130bfaaeb6c89edebaefaaa3261f7c57aa6c5bd88139f405",
"txt_hash": "d4f040f6226e18785b57fd0ebe052d693c1494b22f28acc853bbfd71697c5c8f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Key Management Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Family of Protection Profiles for Public Key Enabled Applications, Version 2.6.1",
"not_valid_after": "2008-03-21",
"not_valid_before": "2004-07-31",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pke_2.6.1.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+"
]
},
"status": "archived",
"version": "2.6.1"
}
}