This page was not yet optimized for use on mobile devices.
U.S. Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.5
Web information ?
Status: archivedCertification date: 2002-12-01
Archived date: 2008-03-21
Scheme: 🇺🇸
Category: Key Management Systems
Security level: EAL4+
Certification report ?
Extracted keywords
Schemes
PKE, Key AgreementSecurity level
EAL 3, EAL 4, EAL3, EAL4Security Assurance Requirements (SAR)
ALC_FLR.1, APE_DES.1, APE_ENV.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SRE.1Security Functional Requirements (SFR)
FCS_CRM_FPS.1Certificates
CCEVS-VR-02-0031Standards
X.509File metadata
Title | Public Key-Enabled Family of Protection Profiles V2 |
---|---|
Author | PAOlson |
Creation date | D:20030516122422Z |
Modification date | D:20030516083619-04'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Profile ?
Extracted keywords
Symmetric Algorithms
HMACAsymmetric Algorithms
ECDH, DH, DSASchemes
PKE, Key AgreementProtocols
SSL, TLSSecurity level
EAL 3, EAL 4, EAL3, EAL4, EAL 3 augmented, EAL 4 augmentedClaims
O.DAC, T.DOS_OCSP, T.DOS_CRL, T.DOS_OSCPSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.1, ADO_IGS.1, ADO_DEL.2, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_HLD.1, ADV_FSP.2, ADV_IMP.1, ADV_LLD.1, ADV_SPM.1, ADV_IMP.2, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MSU.2, AVA_VLA.2, APE_OBJ, APE_REQSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_CRM_FPS.1, FCS_CRM_FPS.1.1, FCS_CRM_FPS.1.2, FDP_ACC.1, FDP_ACF.1, FDP_CPD.1, FDP_DAU_CRL.1, FDP_DAU_ENC.1, FDP_DAU_ENC.2, FDP_DAU_ENC.3, FDP_DAU_OCS.1, FDP_DAU_SIG.1, FDP_ETC_ENC.1, FDP_ETC_ENC.2, FDP_ETC_SIG.1, FDP_ITC_ENC.1, FDP_ITC_ENC.2, FDP_ITC_SIG.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CPD.1.1, FDP_CPD.1.2, FDP_CPD.1.3, FDP_CPD.1.4, FDP_ETC_SIG.1.1, FDP_ETC_SIG.1.2, FDP_ITC_SIG.1.1, FDP_DAU_SIG.1.1, FDP_DAU_SIG.1.2, FDP_DAU_SIG.1.3, FDP_ETC_ENC.1.1, FDP_ETC_ENC.1.2, FDP_DAU_ENC.1.1, FDP_DAU_ENC.1.2, FDP_ETC_ENC.2.2, FDP_ETC_ENC.2.3, FDP_DAU_ENC.2.1, FDP_DAU_ENC.2.2, FDP_ITC_ENC.1.1, FDP_ITC_ENC.1.2, FDP_ITC_ENC.2.2, FDP_ITC_ENC.2.3, FDP_ITC_ENC.2.4, FDP_DAU_ENC.3.1, FDP_DAU_ENC.3.2, FDP_DAU_OCS.1.1, FDP_DAU_OCS.1.2, FDP_DAU_OCS.1.3, FDP_DAU_OCS.1.4, FDP_DAU_OCS.1.5, FDP_DAU_OCS.1.6, FDP_DAU_OCS.1.7, FDP_DAU_OCS.1.8, FDP_DAU_OCS.1.9, FDP_DAU_CRL.1.1, FDP_DAU_CRL.1.2, FDP_DAU_CRL.1.3, FDP_DAU_CRL.1.4, FDP_DAU_CRL.1.5, FDP_DAU_CRL.1.6, FDP_DAU_CRL.1.7, FDP_DAU_CRL.1.8, FDP_DAU_CRL.1.9, FIA_UAU.1.1, FIA_UAU, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_UAU_SIG.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_SOS, FIA_UAU.4.1, FIA_UAU_SIG.1.1, FIA_UAU_SIG.1.2, FIA_UAU_SIG.1.3, FIA_UID, FIA_UAU.6.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MSA.1.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1Side-channel analysis
side channelCertification process
out of scope, Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) areStandards
FIPS 140, FIPS 140-2, FIPS 196, PKCS 7, RFC 2459, RFC 2560, RFC-822, ISO/IEC 15408, X.509File metadata
Title | Microsoft Word - PKEPP_2_5.doc |
---|---|
Creation date | D:20030110152900 |
Modification date | D:20030110153044-05'00' |
Pages | 147 |
Creator | AdobePS5.dll Version 5.1.1 |
Producer | Acrobat Distiller 4.05 for Windows |
References ?
No references are available for this protection profile.
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name U.S. Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.5 was processed.
Raw data
{
"_id": "759cbb3084ab5f7d",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "759cbb3084ab5f7d",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_pke_v2.5.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 8
}
},
"FF": {
"DH": {
"DH": 8
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.DAC": 10
},
"T": {
"T.DOS_CRL": 4,
"T.DOS_OCSP": 2,
"T.DOS_OSCP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 9,
"ACM_CAP.3": 21,
"ACM_CAP.4": 19,
"ACM_SCP.1": 5,
"ACM_SCP.2": 5
},
"ADO": {
"ADO_DEL.1": 6,
"ADO_DEL.2": 8,
"ADO_IGS.1": 16
},
"ADV": {
"ADV_FSP.1": 26,
"ADV_FSP.2": 10,
"ADV_HLD.1": 5,
"ADV_HLD.2": 30,
"ADV_IMP.1": 7,
"ADV_IMP.2": 2,
"ADV_LLD.1": 17,
"ADV_RCR.1": 16,
"ADV_SPM.1": 9
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 35,
"AGD_USR.1": 30
},
"ALC": {
"ALC_DVS.1": 16,
"ALC_FLR.1": 22,
"ALC_LCD.1": 7,
"ALC_TAT.1": 9
},
"APE": {
"APE_OBJ": 1,
"APE_REQ": 1
},
"ATE": {
"ATE_COV.2": 12,
"ATE_DPT.1": 10,
"ATE_FUN.1": 26,
"ATE_IND.2": 16
},
"AVA": {
"AVA_MSU.1": 10,
"AVA_MSU.2": 13,
"AVA_SOF.1": 14,
"AVA_VLA.1": 9,
"AVA_VLA.2": 13
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 63,
"EAL 3 augmented": 22,
"EAL 4": 63,
"EAL 4 augmented": 52,
"EAL3": 3,
"EAL4": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SEL.1": 5,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_COP.1": 25,
"FCS_CRM_FPS.1": 5,
"FCS_CRM_FPS.1.1": 1,
"FCS_CRM_FPS.1.2": 1
},
"FDP": {
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_CPD.1": 6,
"FDP_CPD.1.1": 1,
"FDP_CPD.1.2": 2,
"FDP_CPD.1.3": 2,
"FDP_CPD.1.4": 1,
"FDP_DAU_CRL.1": 14,
"FDP_DAU_CRL.1.1": 1,
"FDP_DAU_CRL.1.2": 1,
"FDP_DAU_CRL.1.3": 1,
"FDP_DAU_CRL.1.4": 1,
"FDP_DAU_CRL.1.5": 1,
"FDP_DAU_CRL.1.6": 1,
"FDP_DAU_CRL.1.7": 1,
"FDP_DAU_CRL.1.8": 1,
"FDP_DAU_CRL.1.9": 1,
"FDP_DAU_ENC.1": 6,
"FDP_DAU_ENC.1.1": 1,
"FDP_DAU_ENC.1.2": 1,
"FDP_DAU_ENC.2": 6,
"FDP_DAU_ENC.2.1": 1,
"FDP_DAU_ENC.2.2": 1,
"FDP_DAU_ENC.3": 6,
"FDP_DAU_ENC.3.1": 1,
"FDP_DAU_ENC.3.2": 1,
"FDP_DAU_OCS.1": 17,
"FDP_DAU_OCS.1.1": 1,
"FDP_DAU_OCS.1.2": 1,
"FDP_DAU_OCS.1.3": 1,
"FDP_DAU_OCS.1.4": 1,
"FDP_DAU_OCS.1.5": 1,
"FDP_DAU_OCS.1.6": 1,
"FDP_DAU_OCS.1.7": 1,
"FDP_DAU_OCS.1.8": 1,
"FDP_DAU_OCS.1.9": 1,
"FDP_DAU_SIG.1": 6,
"FDP_DAU_SIG.1.1": 1,
"FDP_DAU_SIG.1.2": 1,
"FDP_DAU_SIG.1.3": 1,
"FDP_ETC_ENC.1": 9,
"FDP_ETC_ENC.1.1": 1,
"FDP_ETC_ENC.1.2": 1,
"FDP_ETC_ENC.2": 8,
"FDP_ETC_ENC.2.2": 1,
"FDP_ETC_ENC.2.3": 1,
"FDP_ETC_SIG.1": 6,
"FDP_ETC_SIG.1.1": 1,
"FDP_ETC_SIG.1.2": 1,
"FDP_ITC_ENC.1": 7,
"FDP_ITC_ENC.1.1": 1,
"FDP_ITC_ENC.1.2": 1,
"FDP_ITC_ENC.2": 10,
"FDP_ITC_ENC.2.2": 1,
"FDP_ITC_ENC.2.3": 1,
"FDP_ITC_ENC.2.4": 1,
"FDP_ITC_SIG.1": 6,
"FDP_ITC_SIG.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_UAU": 11,
"FIA_UAU.1": 17,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 2,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_SIG.1": 5,
"FIA_UAU_SIG.1.1": 1,
"FIA_UAU_SIG.1.2": 1,
"FIA_UAU_SIG.1.3": 1,
"FIA_UID": 1,
"FIA_UID.1": 24,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.2": 7,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 6,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 17,
"FPT_STM.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"Vs. procedural aspects of path validation. Added an assumption regarding how the key recovery is out of scope Added the approach how multiple keys (e.g., due to key recovery, key history, re-key, etc.) are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 82
},
"PKE": {
"PKE": 34
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 26,
"FIPS 140-2": 1,
"FIPS 196": 1
},
"ISO": {
"ISO/IEC 15408": 4
},
"PKCS": {
"PKCS 7": 8
},
"RFC": {
"RFC 2459": 1,
"RFC 2560": 2,
"RFC-822": 2
},
"X509": {
"X.509": 24
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC": 10
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20030110152900",
"/Creator": "AdobePS5.dll Version 5.1.1",
"/ModDate": "D:20030110153044-05\u002700\u0027",
"/Producer": "Acrobat Distiller 4.05 for Windows",
"/Title": "Microsoft Word - PKEPP_2_5.doc",
"pdf_file_size_bytes": 792133,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 147
},
"report_filename": "pp_pke_v2.5-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-02-0031": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
},
"APE": {
"APE_DES.1": 12,
"APE_ENV.1": 15,
"APE_INT.1": 12,
"APE_OBJ.1": 17,
"APE_REQ.1": 27,
"APE_SRE.1": 17
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL 4": 1,
"EAL3": 1,
"EAL4": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CRM_FPS.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"PKE": {
"PKE": 17
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "PAOlson",
"/CreationDate": "D:20030516122422Z",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20030516083619-04\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Public Key-Enabled Family of Protection Profiles V2",
"pdf_file_size_bytes": 251503,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7042bf17182a99a1c9c0256ff3753569ba269cfd18ad23d2b41c36bd932506b4",
"txt_hash": "62af2d6f630bb9d98442de4400d3b94b6d97830d6f87a5c065b82e7e678637e4"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e94673456ba31d31d967b06766439e5be0c4440ffbbd37f8e55877348c24c816",
"txt_hash": "e8e8852ef028eeca13fc2f5b400d23790be680c8ac4ebd5fa95b224147b9eee4"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Key Management Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Family of Protection Profiles for Public Key Enabled Applications for Basic Robustness Environments, Version 2.5",
"not_valid_after": "2008-03-21",
"not_valid_before": "2002-12-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pke_v2.5.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pke_v2.5-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "2.5"
}
}