This page was not yet optimized for use on mobile
devices.
collaborative Protection Profile for Full Drive Encryption - Authorization Acquisition v2.0 + Errata 20190201
Web information
| Status | active |
|---|---|
| Valid from | 01.02.2019 |
| Scheme | ❌ None |
| Category | Data Protection |
| Security level | None |
Certification report
Extracted keywords
Symmetric Algorithms
AESRandomness
RBGClaims
T.UNAUTHORIZED_DATA, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.UNAUTHORIZED_UPDATE, A.INITIAL_DRIVE_STATE, A.SECURE_STATE, A.TRUSTED_CHANNEL, A.TRAINED_USER, A.PLATFORM_STATE, A.SINGLE_USE_ET, A.POWER_DOWN, A.PASSWORD_STRENGTH, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.STRONG_ENVIRONMENT_CRYPTO, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_AFA_EXT, FCS_CKM.4, FCS_CKM_EXT.4, FCS_KYC_EXT, FCS_SNI_EXT, FCS_CKM.1, FCS_COP.1, FCS_KDF_EXT, FCS_PCC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_VAL_EXT, FMT_MOF, FMT_SMF, FMT_SMR, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TUD_EXT, FPT_TST_EXTEvaluation facilities
Gossamer SecurityFile metadata
| Creation date | D:20190506161000-04'00' |
|---|---|
| Modification date | D:20190506161000-04'00' |
| Pages | 16 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDSA, ECCHash functions
SHA-256, SHA-384, SHA-512, PBKDF2, PBKDFRandomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCM, XEX, XTSClaims
T.UNAUTHORIZED_DATA_ACCESS, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.UNAUTHORIZED_UPDATE, A.INITIAL_DRIVE_STATE, A.SECURE_STATE, A.TRUSTED_CHANNEL, A.TRAINED_USER, A.PLATFORM_STATE, A.SINGLE_USE_ET, A.POWER_DOWN, A.PASSWORD_STRENGTH, A.STRONG_CRYPTO, A.PHYSICAL, OE.INITIAL_DRIVE_STATE, OE.POWER_DOWN, OE.TRUSTED_CHANNEL, OE.PASSPHRASE_STRENGTH, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.STRONG_ENVIRONMENT_CRYPTO, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN, AVA_VAN.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_AFA_EXT.1, FCS_AFA_EXT.2, FCS_CKM.4, FCS_CKM_EXT.4, FCS_KYC_EXT.1, FCS_SNI_EXT.1, FCS_CKM.1, FCS_COP.1, FCS_KDF_EXT.1, FCS_PCC_EXT.1, FCS_RBG_EXT.1, FCS_SMC_EXT.1, FCS_VAL_EXT.1, FCS_AFA_EXT, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_PCC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_SNI_EXT, FCS_AFA_EXT.1.1, FCS_AFA_EXT.2.1, FCS_CKM.4.1, FCS_CKM_EXT.4.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_SNI_EXT.1.3, FCS_COP, FCS_CKM.1.1, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_PCC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SMC_EXT.1.1, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_VAL_EXT, FCS_KYC_EXT.2, FCS_KYC_EXT.2.1, FCS_KYC_EXT.2.2, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP_EXT.1, FPT_PWR_EXT.1, FPT_PWR_EXT.2, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1.1, FPT_PWR_EXT.1.1, FPT_PWR_EXT.2.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1Standards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-90, NIST SP 800-38F, NIST SP 800-56B, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, SP 800-90A, PKCS #1, ISO/IEC 29, ISO/IEC 14888-3, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 33, ISO/IEC 14, ISO/IEC 19772, ISO/IEC 10116, ISO/IEC 9, ISO/IEC 18031:2011, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Author | James Donndelinger |
|---|---|
| Creation date | D:20190205144818-05'00' |
| Modification date | D:20190205144835-05'00' |
| Pages | 72 |
| Creator | Acrobat PDFMaker 15 for Word |
| Producer | Adobe PDF Library 15.0 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- ASURRE-Stor(TM) Solid State Self-Encrypting Drive Hardware revision 3.0, Firmware revision 1.5.1 archived
- Ampex Software Full Drive Encryption active
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15 archived
- Apple macOS 13 Ventura: FileVault archived
- Apple macOS 14 Sonoma: FileVault active
- Archon Linux Unified Key Setup (LUKS) v3.0.0.2 active
- CNS4 Hardware Encryption Layer vA1 archived
- CNS4 Software Encryption Layer vA1 archived
- Cigent PBA Software v1.0.6 archived
- Cigent PBA Software v2.0 active
- Cigent PBA Software with Cigent M.2 2230 PCIe Gen 4 Self-Encrypting Drive (SED) active
- CipherDrive v1.2.2 active
- CipherDriveOne 2.0.1 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.4 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Hardware Encryption Layer version 1.1.0 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Software Encryption Layer v1.01.00 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.0.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.01.00 active
- Curtiss-Wright Defense Solutions HSR10 CSfC Software Encryption Layer v1.1.0 active
- Curtiss-Wright Defense Solutions XMC NVMe Encryptor version 1.0.0 active
- DTS1 Hardware Encryption Layer v1.0 archived
- DTS1 Software Encryption Layer v1.0 archived
- Galleon Embedded Computing XSR and G1 Hardware Encryption Layer archived
- Galleon Embedded Computing XSR and G1 Software Encryption Layer archived
- KLC Group LLC CipherDriveOne Kryptr 1.1.0 active
- L3Harris Common Data Loader Version 02.01 active
- NetApp Storage Encryption (NSE) Running ONTAP 9.14.1 active
- NetApp Storage Encryption (NSE) running ONTAP 9.7P13 archived
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.14.1 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.7P13 archived
- Scalar and Express P-series SSD, version NV.R1900 archived
- Scalar and Express P-series SSD, version NV.R1900 active
- Shift5, Inc. Software Full Drive Encryption active
- TuffServ® Intelligent E-2 Common Data Loader (iECDL) v2.74.1 active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "52d782dbb1cd05bd",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "52d782dbb1cd05bd",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_FDE_AA_V2.0E.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PASSWORD_STRENGTH": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 3,
"A.POWER_DOWN": 2,
"A.SECURE_STATE": 1,
"A.SINGLE_USE_ET": 1,
"A.STRONG_CRYPTO": 2,
"A.TRAINED_USER": 5,
"A.TRUSTED_CHANNEL": 2
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 2,
"OE.PASSPHRASE_STRENGTH": 3,
"OE.PHYSICAL": 2,
"OE.PLATFORM_STATE": 3,
"OE.POWER_DOWN": 4,
"OE.SINGLE_USE_ET": 3,
"OE.STRONG_ENVIRONMENT_CRYPTO": 3,
"OE.TRAINED_USERS": 2,
"OE.TRUSTED_CHANNEL": 2
},
"T": {
"T.AUTHORIZATION_GUESSING": 2,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 2,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 4
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 4
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 3
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4
},
"FCS": {
"FCS_AFA_EXT": 4,
"FCS_AFA_EXT.1": 14,
"FCS_AFA_EXT.1.1": 2,
"FCS_AFA_EXT.2": 11,
"FCS_AFA_EXT.2.1": 2,
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 14,
"FCS_CKM.4.1": 2,
"FCS_CKM_EXT": 4,
"FCS_CKM_EXT.4": 16,
"FCS_CKM_EXT.4.1": 3,
"FCS_COP": 3,
"FCS_COP.1": 101,
"FCS_COP.1.1": 7,
"FCS_KDF_EXT": 4,
"FCS_KDF_EXT.1": 12,
"FCS_KDF_EXT.1.1": 2,
"FCS_KYC_EXT": 5,
"FCS_KYC_EXT.1": 19,
"FCS_KYC_EXT.1.1": 2,
"FCS_KYC_EXT.1.2": 3,
"FCS_KYC_EXT.2": 6,
"FCS_KYC_EXT.2.1": 1,
"FCS_KYC_EXT.2.2": 1,
"FCS_PCC_EXT": 4,
"FCS_PCC_EXT.1": 12,
"FCS_PCC_EXT.1.1": 2,
"FCS_RBG_EXT": 5,
"FCS_RBG_EXT.1": 24,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 4,
"FCS_SMC_EXT": 4,
"FCS_SMC_EXT.1": 19,
"FCS_SMC_EXT.1.1": 2,
"FCS_SNI_EXT": 4,
"FCS_SNI_EXT.1": 11,
"FCS_SNI_EXT.1.1": 2,
"FCS_SNI_EXT.1.2": 2,
"FCS_SNI_EXT.1.3": 3,
"FCS_VAL_EXT": 3,
"FCS_VAL_EXT.1": 23,
"FCS_VAL_EXT.1.1": 3,
"FCS_VAL_EXT.1.2": 2,
"FCS_VAL_EXT.1.3": 2
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_KYP_EXT": 4,
"FPT_KYP_EXT.1": 9,
"FPT_KYP_EXT.1.1": 2,
"FPT_PWR_EXT": 4,
"FPT_PWR_EXT.1": 17,
"FPT_PWR_EXT.1.1": 4,
"FPT_PWR_EXT.2": 11,
"FPT_PWR_EXT.2.1": 2,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 10,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 4,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 10
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 6
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 2,
"PBKDF2": 1
},
"SHA": {
"SHA2": {
"SHA-256": 11,
"SHA-384": 9,
"SHA-512": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
},
"RNG": {
"RBG": 19,
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 186-4": 1,
"FIPS PUB 186-4": 5
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10118": 2,
"ISO/IEC 14": 2,
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 6,
"ISO/IEC 18033-3": 1,
"ISO/IEC 19772": 4,
"ISO/IEC 29": 2,
"ISO/IEC 33": 2,
"ISO/IEC 9": 2
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-132": 4,
"NIST SP 800-38F": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 2,
"NIST SP 800-90A": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 17,
"AES-128": 2,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "James Donndelinger",
"/Company": "NDS",
"/CreationDate": "D:20190205144818-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 15 for Word",
"/ModDate": "D:20190205144835-05\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/SourceModified": "D:20190205174458",
"/bjDocumentLabelXML": "\u003c?xml version=\"1.0\" encoding=\"us-ascii\"?\u003e\u003csisl xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" sislVersion=\"0\" policy=\"c8d5760e-638a-47e8-9e2e-1226c2cb268d\" origin=\"userSelected\" xmlns=\"http://www.boldonj",
"/bjDocumentLabelXML-0": "ames.com/2008/01/sie/internal/label\"\u003e\u003celement uid=\"42834bfb-1ec1-4beb-bd64-eb83fb3cb3f3\" value=\"\" /\u003e\u003c/sisl\u003e",
"/bjDocumentSecurityLabel": "Unrestricted",
"/bjLabelHistoryID": "{64A4920C-75AD-4109-B09E-80F5E11B5F01}",
"/bjSaver": "JiUhheIKcFcescwmYaldfL1b1aoqQYWQ",
"/docIndexRef": "68d674aa-e14b-4e6b-b632-7087a64431e5",
"pdf_file_size_bytes": 580564,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
},
"report_filename": "cpp_fde_aa_v2.0E-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PASSWORD_STRENGTH": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 1,
"A.POWER_DOWN": 1,
"A.SECURE_STATE": 1,
"A.SINGLE_USE_ET": 1,
"A.STRONG_CRYPTO": 1,
"A.TRAINED_USER": 1,
"A.TRUSTED_CHANNEL": 1
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 1,
"OE.PASSPHRASE_STRENGTH": 1,
"OE.PHYSICAL": 1,
"OE.PLATFORM_STATE": 1,
"OE.POWER_DOWN": 1,
"OE.SINGLE_USE_ET": 1,
"OE.STRONG_ENVIRONMENT_CRYPTO": 1,
"OE.TRAINED_USERS": 1,
"OE.TRUSTED_CHANNEL": 1
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.UNAUTHORIZED_DATA": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_AFA_EXT": 2,
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 7,
"FCS_KDF_EXT": 1,
"FCS_KYC_EXT": 1,
"FCS_PCC_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_SMC_EXT": 1,
"FCS_SNI_EXT": 1,
"FCS_VAL_EXT": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_SMF": 1,
"FMT_SMR": 1
},
"FPT": {
"FPT_KYP_EXT": 1,
"FPT_PWR_EXT": 2,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20190506161000-04\u002700\u0027",
"/ModDate": "D:20190506161000-04\u002700\u0027",
"pdf_file_size_bytes": 926492,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "588bf0b108254dfa718c4847ab72b9699239675f1e9f05cd8a354261eb0647db",
"txt_hash": "3ff4c3944482a7a7c1388f35eb04c11340cabcaf30df8f6557bbe1579b34306d"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "87f32a3f7c78f57f066bd1a1840fc1e81cb6c88b122437b26fcbbc14dd11182b",
"txt_hash": "5e68fb5fb57d89de5b74be986e1cca076e1fb19cfd724998053790e01eaf5575"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile for Full Drive Encryption - Authorization Acquisition v2.0 + Errata 20190201",
"not_valid_after": null,
"not_valid_before": "2019-02-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V2.0E.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_fde_aa_v2.0E-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "2.0E"
}
}