This page was not yet optimized for use on mobile devices.
US Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.75
Web information
Status: archivedCertification date: 2005-08-01
Archived date: 2008-03-21
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL2
Certification report
Extracted keywords
Schemes
PKE, Key AgreementSecurity level
EAL 3, EAL 4, EAL2, EAL3, EAL4, EAL2 augmented, EAL3 augmented, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, AVA_MSU.1, APE_DES.1, APE_ENV.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SRE.1Certificates
CCEVS-VR-05-0116Standards
X.509File metadata
Title | 1 Executive Summary |
---|---|
Author | Rick Murphy |
Creation date | D:20050909141020Z |
Modification date | D:20050909101216-04'00' |
Pages | 18 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Profile
Extracted keywords
Symmetric Algorithms
HMACAsymmetric Algorithms
ECDH, DH, DSASchemes
MAC, PKE, Key AgreementProtocols
SSL, TLSSecurity level
EAL 3, EAL 4, EAL 2, EAL3, EAL4, EAL 3 augmented, EAL 4 augmented, EAL 2 augmented, EAL3 augmentedClaims
O.PARTIAL_SELF_PROTECTION, T.AUDIT_COMPROMISE, T.CHANGE_TIME, T.CRYPTO_COMPROMISE, T.MASQUERADE, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.DOS_OCSP, T.DOS_CRL, T.DOS_OSCP, A.NO_EVIL, A.PHYSICAL, OE.NO_EVIL, OE.PHYSICAL, OE.AUDIT_GENERATION, OE.AUDIT_PROTECTION, OE.AUDIT_REVIEW, OE.CORRECT_TSF_OPERATION, OE.CRYPTOGRAPHY, OE.DISPLAY_BANNER, OE.MANAGE, OE.MEDIATE, OE.RESIDUAL_INFORMATION, OE.SELF_PROTECTION, OE.TIME_STAMPS, OE.TIME_TOE, OE.TOE_ACCESS, OE.TOE_PROTECTION, OE.AUDIT_PROTECT, OSPSecurity Assurance Requirements (SAR)
ACM_CAP.2, ACM_CAP.3, ACM_SCP.1, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.1, ADO_IGS.1, ADO_DEL.2, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_HLD.2, ADV_FSP.2, ADV_IMP.1, ADV_LLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_FLR.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MSU.2, AVA_VLA.2, APE_OBJ, APE_REQSecurity Functional Requirements (SFR)
FAU_GEN, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_CRM_FPS.1, FDP_ACC.1, FDP_ACF, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC, FIA_UAU.1.1, FIA_UAU, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.2, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.7.1, FIA_USB.1.1, FIA_USB.1.2, FIA_AFL, FIA_SOS, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MSA.3, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MFT, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_SEP, FPT_STM.1.1, FPT_SEP_ENV.1, FPT_TST_SOF.1, FTA_SSL.1, FTA_SSL.2, FTA_TAB.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_TAB.1.1Side-channel analysis
side channelCertification process
out of scope, Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) areStandards
FIPS 140, FIPS 140-2, FIPS 196, PKCS 7, RFC 3280, RFC 2560, RFC-822, ISO/IEC 15408, X.509File metadata
Title | Introduction |
---|---|
Author | Jean Petty |
Creation date | D:20050909141446Z |
Modification date | D:20050909103611-04'00' |
Pages | 151 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 318405, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Rick Murphy', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20050909101216-04'00'", '/Title': '1 Executive Summary', '/CreationDate': 'D:20050909141020Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 2346043, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 151, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Jean Petty', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20050909103611-04'00'", '/Title': 'Introduction', '/CreationDate': 'D:20050909141446Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf']}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-05-0116': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 2, 'EAL 4': 2, 'EAL2': 1, 'EAL3': 1, 'EAL4': 1, 'EAL2 augmented': 1, 'EAL3 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}, 'AVA': {'AVA_MSU.1': 1}, 'APE': {'APE_DES.1': 12, 'APE_ENV.1': 13, 'APE_INT.1': 11, 'APE_OBJ.1': 16, 'APE_REQ.1': 26, 'APE_SRE.1': 17}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'PKE': {'PKE': 15}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 18, 'EAL 4': 20, 'EAL 2': 2, 'EAL3': 1, 'EAL4': 2, 'EAL 3 augmented': 2, 'EAL 4 augmented': 4, 'EAL 2 augmented': 1, 'EAL3 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 1, 'ACM_CAP.3': 1, 'ACM_SCP.1': 1, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 5, 'ADO_DEL.2': 1}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 1, 'ADV_RCR.1': 3, 'ADV_HLD.2': 2, 'ADV_FSP.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1}, 'AGD': {'AGD_ADM.1': 7, 'AGD_USR.1': 6}, 'ALC': {'ALC_FLR.1': 1, 'ALC_FLR.2': 11, 'ALC_DVS.1': 2, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 3, 'ATE_IND.2': 3, 'ATE_COV.2': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_MSU.1': 3, 'AVA_SOF.1': 3, 'AVA_VLA.1': 2, 'AVA_MSU.2': 1, 'AVA_VLA.2': 1}, 'APE': {'APE_OBJ': 1, 'APE_REQ': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 30, 'FAU_SAR.1': 10, 'FAU_SAR.2': 7, 'FAU_SAR.3': 8, 'FAU_SEL': 7, 'FAU_STG': 18, 'FAU_GEN.1': 15, 'FAU_GEN.2': 3, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1': 1, 'FAU_STG.1': 4, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP.1': 5, 'FCS_CRM_FPS.1': 2}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF': 8, 'FDP_RIP.2': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 4, 'FDP_RIP.1': 1, 'FDP_IFC': 2}, 'FIA': {'FIA_UAU.1.1': 2, 'FIA_UAU': 1, 'FIA_AFL.1': 7, 'FIA_ATD.1': 8, 'FIA_UAU.1': 15, 'FIA_UAU.2': 11, 'FIA_UAU.4': 6, 'FIA_UAU.6': 7, 'FIA_UAU.7': 7, 'FIA_UID.1': 18, 'FIA_UID.2': 11, 'FIA_USB.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.7.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_AFL': 1, 'FIA_SOS': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 8, 'FMT_MSA': 8, 'FMT_MTD': 22, 'FMT_SMF.1': 16, 'FMT_SMR.1': 19, 'FMT_MTD.1': 4, 'FMT_MSA.3': 4, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MTD.1.1': 5, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MFT': 1}, 'FPT': {'FPT_RVM.1': 7, 'FPT_SEP.1': 8, 'FPT_STM.1': 23, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_SEP': 2, 'FPT_STM.1.1': 1, 'FPT_SEP_ENV.1': 2, 'FPT_TST_SOF.1': 1}, 'FTA': {'FTA_SSL.1': 7, 'FTA_SSL.2': 6, 'FTA_TAB.1': 7, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_TAB.1.1': 1}}, 'cc_claims': {'O': {'O.PARTIAL_SELF_PROTECTION': 2}, 'T': {'T.AUDIT_COMPROMISE': 7, 'T.CHANGE_TIME': 4, 'T.CRYPTO_COMPROMISE': 5, 'T.MASQUERADE': 4, 'T.POOR_TEST': 4, 'T.RESIDUAL_DATA': 4, 'T.TSF_COMPROMISE': 7, 'T.UNATTENDED_SESSION': 4, 'T.UNAUTHORIZED_ACCESS': 4, 'T.UNIDENTIFIED_ACTIONS': 7, 'T.DOS_OCSP': 4, 'T.DOS_CRL': 5, 'T.DOS_OSCP': 2}, 'A': {'A.NO_EVIL': 4, 'A.PHYSICAL': 4}, 'OE': {'OE.NO_EVIL': 6, 'OE.PHYSICAL': 10, 'OE.AUDIT_GENERATION': 10, 'OE.AUDIT_PROTECTION': 6, 'OE.AUDIT_REVIEW': 7, 'OE.CORRECT_TSF_OPERATION': 7, 'OE.CRYPTOGRAPHY': 10, 'OE.DISPLAY_BANNER': 7, 'OE.MANAGE': 7, 'OE.MEDIATE': 7, 'OE.RESIDUAL_INFORMATION': 13, 'OE.SELF_PROTECTION': 11, 'OE.TIME_STAMPS': 12, 'OE.TIME_TOE': 10, 'OE.TOE_ACCESS': 13, 'OE.TOE_PROTECTION': 10, 'OE.AUDIT_PROTECT': 1}, 'OSP': {'OSP': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'constructions': {'MAC': {'HMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 8}}, 'FF': {'DH': {'DH': 8}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'PKE': {'PKE': 190}, 'KA': {'Key Agreement': 82}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 6}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140': 9, 'FIPS 140-2': 6, 'FIPS 196': 1}, 'PKCS': {'PKCS 7': 7}, 'RFC': {'RFC 3280': 1, 'RFC 2560': 3, 'RFC-822': 2}, 'ISO': {'ISO/IEC 15408': 4}, 'X509': {'X.509': 25}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'be0b08394c3b10cde8824af6167262924e0335e57e14d84b6007a96cc01c15b1', 'txt_hash': '41fc00f782dd46808f1e0906c75af0587cca07c6bbd2b7bd5da65dc3b5c84b7d'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '823968001d23c0fd8c7b5b2871318dff787ec797c1fe6bb87f873234c87457fd', 'txt_hash': 'da182e8a94f8326f579e2dfb3a3f264ec1ed34ce3d979c48ce6cb8464b70ef6b'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name US Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.75 was processed.
Raw data
{
"_id": "3766989820196361",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "3766989820196361",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_VID10079-PP.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 8
}
},
"FF": {
"DH": {
"DH": 8
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_EVIL": 4,
"A.PHYSICAL": 4
},
"O": {
"O.PARTIAL_SELF_PROTECTION": 2
},
"OE": {
"OE.AUDIT_GENERATION": 10,
"OE.AUDIT_PROTECT": 1,
"OE.AUDIT_PROTECTION": 6,
"OE.AUDIT_REVIEW": 7,
"OE.CORRECT_TSF_OPERATION": 7,
"OE.CRYPTOGRAPHY": 10,
"OE.DISPLAY_BANNER": 7,
"OE.MANAGE": 7,
"OE.MEDIATE": 7,
"OE.NO_EVIL": 6,
"OE.PHYSICAL": 10,
"OE.RESIDUAL_INFORMATION": 13,
"OE.SELF_PROTECTION": 11,
"OE.TIME_STAMPS": 12,
"OE.TIME_TOE": 10,
"OE.TOE_ACCESS": 13,
"OE.TOE_PROTECTION": 10
},
"OSP": {
"OSP": 1
},
"T": {
"T.AUDIT_COMPROMISE": 7,
"T.CHANGE_TIME": 4,
"T.CRYPTO_COMPROMISE": 5,
"T.DOS_CRL": 5,
"T.DOS_OCSP": 4,
"T.DOS_OSCP": 2,
"T.MASQUERADE": 4,
"T.POOR_TEST": 4,
"T.RESIDUAL_DATA": 4,
"T.TSF_COMPROMISE": 7,
"T.UNATTENDED_SESSION": 4,
"T.UNAUTHORIZED_ACCESS": 4,
"T.UNIDENTIFIED_ACTIONS": 7
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.2": 1,
"ACM_CAP.3": 1,
"ACM_CAP.4": 1,
"ACM_SCP.1": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_DEL.2": 1,
"ADO_IGS.1": 5
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_FSP.2": 1,
"ADV_HLD.1": 1,
"ADV_HLD.2": 2,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 3
},
"AGD": {
"AGD_ADM.1": 7,
"AGD_USR.1": 6
},
"ALC": {
"ALC_DVS.1": 2,
"ALC_FLR.1": 1,
"ALC_FLR.2": 11,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"APE": {
"APE_OBJ": 1,
"APE_REQ": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_DPT.1": 2,
"ATE_FUN.1": 3,
"ATE_IND.2": 3
},
"AVA": {
"AVA_MSU.1": 3,
"AVA_MSU.2": 1,
"AVA_SOF.1": 3,
"AVA_VLA.1": 2,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 2 augmented": 1,
"EAL 3": 18,
"EAL 3 augmented": 2,
"EAL 4": 20,
"EAL 4 augmented": 4,
"EAL3": 1,
"EAL3 augmented": 1,
"EAL4": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 30,
"FAU_GEN.1": 15,
"FAU_GEN.2": 3,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1,
"FAU_SEL": 7,
"FAU_SEL.1": 1,
"FAU_STG": 18,
"FAU_STG.1": 4,
"FAU_STG.4": 1
},
"FCS": {
"FCS_COP.1": 5,
"FCS_CRM_FPS.1": 2
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF": 8,
"FDP_ACF.1": 4,
"FDP_IFC": 2,
"FDP_RIP.1": 1,
"FDP_RIP.2": 7
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 15,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 11,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 7,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 18,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 11,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1
},
"FMT": {
"FMT_MFT": 1,
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA": 8,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 4,
"FMT_MTD": 22,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 5,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 7,
"FPT_RVM.1.1": 1,
"FPT_SEP": 2,
"FPT_SEP.1": 8,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_SEP_ENV.1": 2,
"FPT_STM.1": 23,
"FPT_STM.1.1": 1,
"FPT_TST_SOF.1": 1
},
"FTA": {
"FTA_SSL.1": 7,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.2": 6,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 1,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 82
},
"MAC": {
"MAC": 2
},
"PKE": {
"PKE": 190
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 5
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 9,
"FIPS 140-2": 6,
"FIPS 196": 1
},
"ISO": {
"ISO/IEC 15408": 4
},
"PKCS": {
"PKCS 7": 7
},
"RFC": {
"RFC 2560": 3,
"RFC 3280": 1,
"RFC-822": 2
},
"X509": {
"X.509": 25
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Jean Petty",
"/CreationDate": "D:20050909141446Z",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20050909103611-04\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Introduction",
"pdf_file_size_bytes": 2346043,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 151
},
"report_filename": "PP_VID10079-VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-05-0116": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 3
},
"APE": {
"APE_DES.1": 12,
"APE_ENV.1": 13,
"APE_INT.1": 11,
"APE_OBJ.1": 16,
"APE_REQ.1": 26,
"APE_SRE.1": 17
},
"AVA": {
"AVA_MSU.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 2,
"EAL 4": 2,
"EAL2": 1,
"EAL2 augmented": 1,
"EAL3": 1,
"EAL3 augmented": 1,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"PKE": {
"PKE": 15
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 6
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Rick Murphy",
"/CreationDate": "D:20050909141020Z",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20050909101216-04\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "1 Executive Summary",
"pdf_file_size_bytes": 318405,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "be0b08394c3b10cde8824af6167262924e0335e57e14d84b6007a96cc01c15b1",
"txt_hash": "41fc00f782dd46808f1e0906c75af0587cca07c6bbd2b7bd5da65dc3b5c84b7d"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "823968001d23c0fd8c7b5b2871318dff787ec797c1fe6bb87f873234c87457fd",
"txt_hash": "da182e8a94f8326f579e2dfb3a3f264ec1ed34ce3d979c48ce6cb8464b70ef6b"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "US Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.75",
"not_valid_after": "2008-03-21",
"not_valid_before": "2005-08-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VID10079-PP.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VID10079-VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"status": "archived",
"version": "2.75"
}
}