U.S. Government Family of Protection Profiles for Public Key Enabled Applications, Version 2.6.1

Web information

Status archived
Valid from 31.07.2004
Valid until 21.03.2008
Scheme 🇺🇸 US
Category Key Management Systems
Security level EAL3+

Certification report

certification report file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: ERROR
Extract keywords: ERROR

Protection Profile

Extracted keywords

Symmetric Algorithms
HMAC
Asymmetric Algorithms
ECDH, DH, DSA
Schemes
PKE, Key Agreement
Protocols
SSL, TLS

Security level
EAL 3, EAL 4, EAL3, EAL4, EAL 3 augmented, EAL 4 augmented
Claims
O.DAC, T.DOS_OCSP, T.DOS_CRL, T.DOS_OSCP
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.1, ADO_IGS.1, ADO_DEL.2, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_HLD.1, ADV_FSP.2, ADV_IMP.1, ADV_LLD.1, ADV_SPM.1, ADV_IMP.2, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MSU.2, AVA_VLA.2, APE_OBJ, APE_REQ
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_CRM_FPS.1, FCS_CRM_FPS.1.1, FCS_CRM_FPS.1.2, FDP_ACC.1, FDP_ACF.1, FDP_CPD.1, FDP_DAU_CRL.1, FDP_DAU_ENC.1, FDP_DAU_ENC.2, FDP_DAU_ENC.3, FDP_DAU_OCS.1, FDP_DAU_SIG.1, FDP_ETC_ENC.1, FDP_ETC_ENC.2, FDP_ETC_SIG.1, FDP_ITC_ENC.1, FDP_ITC_ENC.2, FDP_ITC_SIG.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CPD.1.1, FDP_CPD.1.2, FDP_CPD.1.3, FDP_CPD.1.4, FDP_ETC_SIG.1.1, FDP_ETC_SIG.1.2, FDP_ITC_SIG.1.1, FDP_DAU_SIG.1.1, FDP_DAU_SIG.1.2, FDP_DAU_SIG.1.3, FDP_ETC_ENC.1.1, FDP_ETC_ENC.1.2, FDP_DAU_ENC.1.1, FDP_DAU_ENC.1.2, FDP_ETC_ENC.2.2, FDP_ETC_ENC.2.3, FDP_DAU_ENC.2.1, FDP_DAU_ENC.2.2, FDP_ITC_ENC.1.1, FDP_ITC_ENC.2.2, FDP_ITC_ENC.2.3, FDP_DAU_ENC.3.1, FDP_DAU_ENC.3.2, FDP_DAU_OCS.1.1, FDP_DAU_OCS.1.2, FDP_DAU_OCS.1.3, FDP_DAU_OCS.1.4, FDP_DAU_OCS.1.5, FDP_DAU_OCS.1.6, FDP_DAU_OCS.1.7, FDP_DAU_OCS.1.8, FDP_DAU_OCS.1.9, FDP_DAU_CRL.1.1, FDP_DAU_CRL.1.2, FDP_DAU_CRL.1.3, FDP_DAU_CRL.1.4, FDP_DAU_CRL.1.5, FDP_DAU_CRL.1.6, FDP_DAU_CRL.1.7, FDP_DAU_CRL.1.8, FDP_DAU_CRL.1.9, FIA_UAU.1.1, FIA_UAU, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_UAU_SIG.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_SOS, FIA_UAU_SIG.1.1, FIA_UAU_SIG.1.2, FIA_UAU_SIG.1.3, FIA_UID, FIA_UAU.6.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MSA.1.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1

Side-channel analysis
side channel
Certification process
out of scope, Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are

Standards
FIPS 140, FIPS 140-2, FIPS 196, PKCS 7, RFC 3280, RFC 2560, RFC-822, ISO/IEC 15408, X.509

File metadata

Title Introduction
Author Jean Petty
Creation date D:20041028103242-04'00'
Modification date D:20041028103559-03'00'
Pages 147
Creator Acrobat PDFMaker 5.0 for Word
Producer Acrobat Distiller 5.0.5 (Windows)

References

No references are available for this protection profile.

Updates Feed

  • The protection profile data changed.
  • The protection profile data changed.
  • The protection profile data changed.
  • The protection profile was first processed.

Raw data

{
  "_id": "1b9700551307383a",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "1b9700551307383a",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp_pke_2.6.1.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 8
          }
        },
        "FF": {
          "DH": {
            "DH": 8
          },
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.DAC": 10
        },
        "T": {
          "T.DOS_CRL": 4,
          "T.DOS_OCSP": 2,
          "T.DOS_OSCP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 9,
          "ACM_CAP.3": 20,
          "ACM_CAP.4": 19,
          "ACM_SCP.1": 4,
          "ACM_SCP.2": 4
        },
        "ADO": {
          "ADO_DEL.1": 6,
          "ADO_DEL.2": 8,
          "ADO_IGS.1": 16
        },
        "ADV": {
          "ADV_FSP.1": 26,
          "ADV_FSP.2": 10,
          "ADV_HLD.1": 5,
          "ADV_HLD.2": 29,
          "ADV_IMP.1": 7,
          "ADV_IMP.2": 2,
          "ADV_LLD.1": 17,
          "ADV_RCR.1": 16,
          "ADV_SPM.1": 9
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 33,
          "AGD_USR.1": 28
        },
        "ALC": {
          "ALC_DVS.1": 16,
          "ALC_FLR.1": 21,
          "ALC_LCD.1": 7,
          "ALC_TAT.1": 9
        },
        "APE": {
          "APE_OBJ": 1,
          "APE_REQ": 1
        },
        "ATE": {
          "ATE_COV.2": 12,
          "ATE_DPT.1": 10,
          "ATE_FUN.1": 25,
          "ATE_IND.2": 16
        },
        "AVA": {
          "AVA_MSU.1": 10,
          "AVA_MSU.2": 13,
          "AVA_SOF.1": 12,
          "AVA_VLA.1": 9,
          "AVA_VLA.2": 12
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 63,
          "EAL 3 augmented": 22,
          "EAL 4": 63,
          "EAL 4 augmented": 52,
          "EAL3": 3,
          "EAL4": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SEL.1": 5,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_COP.1": 5,
          "FCS_CRM_FPS.1": 23,
          "FCS_CRM_FPS.1.1": 1,
          "FCS_CRM_FPS.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_CPD.1": 6,
          "FDP_CPD.1.1": 1,
          "FDP_CPD.1.2": 2,
          "FDP_CPD.1.3": 2,
          "FDP_CPD.1.4": 1,
          "FDP_DAU_CRL.1": 13,
          "FDP_DAU_CRL.1.1": 1,
          "FDP_DAU_CRL.1.2": 1,
          "FDP_DAU_CRL.1.3": 1,
          "FDP_DAU_CRL.1.4": 1,
          "FDP_DAU_CRL.1.5": 1,
          "FDP_DAU_CRL.1.6": 1,
          "FDP_DAU_CRL.1.7": 1,
          "FDP_DAU_CRL.1.8": 1,
          "FDP_DAU_CRL.1.9": 1,
          "FDP_DAU_ENC.1": 4,
          "FDP_DAU_ENC.1.1": 1,
          "FDP_DAU_ENC.1.2": 1,
          "FDP_DAU_ENC.2": 6,
          "FDP_DAU_ENC.2.1": 1,
          "FDP_DAU_ENC.2.2": 1,
          "FDP_DAU_ENC.3": 5,
          "FDP_DAU_ENC.3.1": 1,
          "FDP_DAU_ENC.3.2": 1,
          "FDP_DAU_OCS.1": 15,
          "FDP_DAU_OCS.1.1": 1,
          "FDP_DAU_OCS.1.2": 1,
          "FDP_DAU_OCS.1.3": 1,
          "FDP_DAU_OCS.1.4": 1,
          "FDP_DAU_OCS.1.5": 1,
          "FDP_DAU_OCS.1.6": 1,
          "FDP_DAU_OCS.1.7": 1,
          "FDP_DAU_OCS.1.8": 1,
          "FDP_DAU_OCS.1.9": 1,
          "FDP_DAU_SIG.1": 5,
          "FDP_DAU_SIG.1.1": 1,
          "FDP_DAU_SIG.1.2": 1,
          "FDP_DAU_SIG.1.3": 1,
          "FDP_ETC_ENC.1": 9,
          "FDP_ETC_ENC.1.1": 1,
          "FDP_ETC_ENC.1.2": 1,
          "FDP_ETC_ENC.2": 8,
          "FDP_ETC_ENC.2.2": 1,
          "FDP_ETC_ENC.2.3": 1,
          "FDP_ETC_SIG.1": 6,
          "FDP_ETC_SIG.1.1": 1,
          "FDP_ETC_SIG.1.2": 1,
          "FDP_ITC_ENC.1": 7,
          "FDP_ITC_ENC.1.1": 1,
          "FDP_ITC_ENC.2": 10,
          "FDP_ITC_ENC.2.2": 1,
          "FDP_ITC_ENC.2.3": 1,
          "FDP_ITC_SIG.1": 6,
          "FDP_ITC_SIG.1.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_UAU": 11,
          "FIA_UAU.1": 17,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 6,
          "FIA_UAU.6": 4,
          "FIA_UAU.6.1": 2,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_SIG.1": 5,
          "FIA_UAU_SIG.1.1": 1,
          "FIA_UAU_SIG.1.2": 1,
          "FIA_UAU_SIG.1.3": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 23,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_MSA.1": 7,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 13,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.2": 6,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_RVM.1": 6,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 6,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 17,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 6
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 82
        },
        "PKE": {
          "PKE": 176
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 3
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 26,
          "FIPS 140-2": 1,
          "FIPS 196": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4
        },
        "PKCS": {
          "PKCS 7": 7
        },
        "RFC": {
          "RFC 2560": 3,
          "RFC 3280": 1,
          "RFC-822": 2
        },
        "X509": {
          "X.509": 22
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 10
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "Jean Petty",
      "/CreationDate": "D:20041028103242-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 for Word",
      "/ModDate": "D:20041028103559-03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "Introduction",
      "pdf_file_size_bytes": 2174646,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 147
    },
    "report_filename": "",
    "report_keywords": null,
    "report_metadata": null
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "4d8a1c424d077361130bfaaeb6c89edebaefaaa3261f7c57aa6c5bd88139f405",
      "txt_hash": "d4f040f6226e18785b57fd0ebe052d693c1494b22f28acc853bbfd71697c5c8f"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
      "txt_hash": null
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Key Management Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "U.S. Government Family of Protection Profiles for Public Key Enabled Applications, Version 2.6.1",
    "not_valid_after": "2008-03-21",
    "not_valid_before": "2004-07-31",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pke_2.6.1.pdf",
    "report_link": "https://www.commoncriteriaportal.org#no_cert",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL3+"
      ]
    },
    "status": "archived",
    "version": "2.6.1"
  }
}