This page was not yet optimized for use on mobile devices.
Extended Package for Secure Shell (SSH), Version 1.0
CSV information ?
Status: activeCertification date: 2016-02-19 00:00:00
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Frontpage information ?
Title: Extended Package for Secure Shell (SSHVersion: 1.0
Protection profile ?
Protection Profile ID:- PP_SSH_EP_V1.0
Extracted keywords
Algorithms
AES, ECDSAProtection profiles
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003Security Functional Requirements (SFR)
FCS_COP, FCS_COP.1Standards
NIST SP 800-38A, RFC 4251, RFC 4253, RFC 5647, RFC 6668, RFC 4251, RFC 4253, RFC 5647, RFC 6668References ?
No references are available for this protection profile.
Raw data
{
"_id": "5f6ba13a74106fd4b5c9",
"csv_scan": {
"cc_archived_date": null,
"cc_category": "Other Devices and Systems",
"cc_certification_date": "2016-02-19 00:00:00",
"cc_pp_name": "Extended Package for Secure Shell (SSH), Version 1.0",
"cc_pp_version": "1.0",
"cc_security_level": "EAL1",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/pp_ssh_ep_v1.0.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/pp_ssh_ep_v1.0-vr.pdf",
"maintainance_updates": [],
"scheme": "US"
},
"frontpage_scan": [
{
"match_rules": [
"^\\d?(?P\u003cpp_title\u003e.+?)Version: (?P\u003cpp_version_number\u003e\\d\\.\\d\\.?\\d?)? (?P\u003cpp_date\u003e[12]\\d{3}-(?:0[1-9]|1[0-2])-(?:0[1-9]|[12]\\d|3[01]))? National Information Assurance Partnership"
],
"pp_date": "2016-02-19",
"pp_registrator_simplified": "NIAP",
"pp_title": "Extended Package for Secure Shell (SSH",
"pp_version_number": "1.0"
}
],
"keywords_scan": {
"block_cipher_modes": {
"CBC": {
"CBC": {
"count": 1
}
},
"ECB": {
"ECB": {
"count": 2
}
}
},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {
".{0,100}[oO]ut of [sS]cope.{0,100}": {
"hat algorithms indicated as \"REQUIRED\" but not listed in later elements of this Extended Package is out of scope for the assurance activity for this requirement. If client is selected, then the ST must include": {
"count": 1
}
},
"[oO]ut of [sS]cope": {
"out of scope": {
"count": 1
}
}
},
"rules_cplc": {},
"rules_crypto_algs": {
"AES[-]*(?:128|192|256|)": {
"AES": {
"count": 2
}
},
"ECDSA": {
"ECDSA": {
"count": 1
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {},
"rules_device_id": {},
"rules_ecc_curves": {},
"rules_javacard": {},
"rules_os": {},
"rules_other": {},
"rules_protection_profiles": {
"CCMB-20[0-9]+?-[0-9]+?-[0-9]+?": {
"CCMB-2012-09-001": {
"count": 1
},
"CCMB-2012-09-002": {
"count": 1
},
"CCMB-2012-09-003": {
"count": 1
}
}
},
"rules_security_assurance_components": {},
"rules_security_functional_components": {
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_COP": {
"count": 1
},
"FCS_COP.1": {
"count": 1
}
}
},
"rules_security_level": {},
"rules_standard_id": {
"NIST SP [0-9]+-[0-9]+?[a-zA-Z]?": {
"NIST SP 800-38A": {
"count": 1
}
},
"RFC [0-9]+": {
"RFC 4251": {
"count": 1
},
"RFC 4253": {
"count": 7
},
"RFC 5647": {
"count": 8
},
"RFC 6668": {
"count": 2
}
},
"RFC[ ]*[0-9]+?": {
"RFC 4251": {
"count": 1
},
"RFC 4253": {
"count": 7
},
"RFC 5647": {
"count": 8
},
"RFC 6668": {
"count": 2
}
}
},
"rules_technical_reports": {},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"candidate_pp_filenames": [
"pp_ssh_ep_v1.0",
"pp_ssh_ep_v1.0"
],
"cc_pp_id": "PP_SSH_EP_V1.0",
"exact_match": true,
"real_pp_filename": "pp_ssh_ep_v1.0",
"separate_profiles": [
{
"pp_filename": "pp_ssh_ep_v1.0",
"pp_id": "PP_OD_02192016_V_010000/025",
"pp_id_csv": "PP_SSH_EP_V1.0",
"pp_id_legacy": ""
}
]
},
"processed": {
"cc_pp_csvid": [
"PP_SSH_EP_V1.0"
],
"cert_id": ""
}
}