This page was not yet optimized for use on mobile devices.
Protection Profile for Mobile Device Fundamentals Version 1.1
Web information ?
Status: archivedCertification date: 2014-02-18
Archived date: 2015-03-17
Scheme: 🇺🇸
Category: Mobility
Security level: None
Certification report ?
Extracted keywords
Protocols
TLS, DTLS, VPNVendor
SamsungClaims
D, O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT, ATE_IND.1, AVA_VAN.1, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SEL, FAU_STG_EXT, FCS_CKM.1, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLS_EXT, FCS_DTLS_EXT, FCS_RBG_EXT.1, FDP_ACF_EXT, FDP_DAR_EXT, FDP_STG_EXT.1, FDP_ACF_EXT.1, FDP_IFC_EXT, FIA_AFL_EXT, FIA_PAE_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU, FIA_UAU_EXT, FIA_BLT_EXT, FMT_MOF.1, FMT_SMF, FMT_SMF_EXT, FMT_POL_EXT, FPT_AEX_EXT, FPT_KST_EXT, FPT_NOT_EXT, FPT_STM, FPT_TST_EXT, FPT_TUD_EXT, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_BBD_EXT, FPT_TST_EXT.2, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FTA_SSL_EXT, FTA_WSE_EXT, FTA_TAB, FTP_ITC_EXTEvaluation facilities
Gossamer SecurityFile metadata
Author | Aerospace Corporation |
---|---|
Creation date | D:20141117144655-05'00' |
Modification date | D:20141117144704-05'00' |
Pages | 14 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-, AES-128, AES-256, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDHE, ECDH, ECDSA, ECC, DHE, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA256, PBKDFSchemes
MAC, Key Agreement, AEADProtocols
SSH, TLS, TLS 1.0, TLS 1.1, TLS 1.2, DTLS, DTLS 1.0, DTLS 1.2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521, P-284Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTSTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384Vendor
Samsung, Microsoft CorporationSecurity level
EAL1Claims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_TSU_EXT, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ALC_TSU_EXT.1, ALC_TSU_EXT.2, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FCS_TLS_EXT.1, FCS_TLS_EXT.2, FCS_CKM, FCS_COP, FCS_RBG, FCS_SRV, FCS_STG, FCS_TLS, FCS_DTLS, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_DTLS_EXT.1, FCS_RBG_EXT.1, FCS_SRV_EXT.1, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_STG_EXT.1, FCS_STG_EXT.2, FCS_STG_EXT.3, FCS_ACF_EXT.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM.2.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_RBG_EXT.1.3, FCS_SRV_EXT.1.1, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_STG_EXT.2.1, FCS_DAR_EXT.3, FCS_STG_EXT.2.2, FCS_STG_EXT.3.1, FCS_STG_EXT.3.2, FCS_TLS_EXT.1.1, FCS_TLS_EXT.1.2, FCS_TLS_EXT.2.1, FCS_TLS_EXT.2.2, FCS_DTLS_EXT.1.1, FCS_RBG_EXT.1.4, FCS_RBG_EXT.1.5, FDP_ACF, FDP_DAR, FDP_STG, FDP_IFC, FDP_STG_EXT.1, FDP_DAR_EXT.1, FDP_DAR_EXT.2, FDP_DAR_EXT.2.1, FDP_ACF_EXT.1, FDP_ACF_EXT.1.1, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_STG_EXT.1.1, FDP_ITC_EXT.1, FDP_IFC.1.1, FDP_ACF_EXT.1.2, FDP_ACF_EXT.1.3, FDP_DAR_EXT.2.2, FDP_DAR_EXT.2.3, FDP_DAR_EXT.2.4, FDP_IFC_EXT.1, FDP_IFC_EXT.1.1, FDP_IFC_EXT, FDP_DAR_EXT.3, FIA_AFL, FIA_PAE, FIA_PMG, FIA_TRT, FIA_UAU, FIA_BLT, FIA_PAE_EXT.1, FIA_UAU_EXT.1, FIA_AFL_EXT.1, FIA_BLT_EXT.1, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU.7, FIA_UAU_EXT.2, FIA_UAU_EXT.3, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_AFL.1, FIA_BLT_EXT.1.1, FMT_MOF, FMT_SMF, FMT_POL, FMT_MOF.1, FMT_POL_EXT.1, FMT_SMF.1, FMT_SMF_EXT.1, FMT_MOF.1.1, FMT_SMF.1.1, FPT_AEX_EXT, FPT_KST, FPT_NOT, FPT_STM, FPT_TST, FPT_TUD, FPT_AEX, FPT_BBD, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_BBD_EXT.1, FPT_NOT_EXT.1, FPT_STM.1, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.2.5, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.1.4, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT_EXT.1.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.2.1, FPT_TST_EXT.2.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.4, FPT_AEX_EXT.1.3, FPT_AEX_EXT.1.4, FPT_AEX_EXT.2.2, FPT_BBD_EXT.1.1, FPT_TUD_EXT.2.6, FTA_SSL, FTA_WSE, FTA_TAB, FTA_WSE_EXT.1, FTA_TAB_EXT.1, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_WSE_EXT.1.1, FTA_TAB.1.1, FTP_ITC, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3Side-channel analysis
malfunctionCertification process
out of scope, expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. 3.1.4 T.FLAWAPP Malicious or Flawed Application Applications loadedStandards
FIPS PUB 186-4, FIPS 186-4, FIPS PUB 197, FIPS 140-2, NIST SP 800-56A, SP 800-56A, NIST SP 800-38F, SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38E, SP 800-38C, NIST SP 800-132, NIST SP 800-57, SP 800-90A, NIST SP 800-57A, SP 800-38A, SP 800-38E, SP 800-38B, SP 800-38F, SP 800-38D, RFC 5216, RFC 2246, RFC 4346, RFC 5246, RFC 5289, RFC 6460, RFC 5280, RFC 2560, RFC 5759, RFC 4347, RFC 6347, RFC 2818, RFC 2986, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20140218150220-05'00' |
---|---|
Modification date | D:20140218150220-05'00' |
Pages | 134 |
References ?
- LG Electronic, Inc. G3 Smartphone Lollipop OS archived
- LG Electronics Inc. G4 Smartphone archived
- LG Electronics, Inc. G3 Smartphone archived
- Microsoft Surface Pro 3, Windows 8.1 archived
- Microsoft Windows 8.1, Phone 8.1 archived
- Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors including the Galaxy S4, Galaxy Note 3, and the Galaxy NotePRO Tablet archived
- Samsung Galaxy Note 4, Galaxy Note Edge, Galaxy Alpha & Galaxy Tab S 8.4 LTE & 10.5 LTE archived
- Samsung Galaxy Note 4, Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S 8.4 LTE & 10.5 LTE, & Galaxy Tab Active with KNOX 2 archived
- Samsung Galaxy Note Edge & Galaxy Tab Active archived
- Samsung Galaxy S5 & Note 10.1 2014 Edition archived
- Samsung Galaxy S5 with KNOX 2 archived
- Samsung Z with Tizen Version 2.3 archived
- Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Mobile Device Fundamentals Version 1.1 was processed.
Raw data
{
"_id": "7a7b216fc3e5f2ae",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "7a7b216fc3e5f2ae",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_MD_v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 7
},
"ECDH": {
"ECDH": 1,
"ECDHE": 2
},
"ECDSA": {
"ECDSA": 18
}
},
"FF": {
"DH": {
"DH": 1,
"DHE": 2,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 2,
"A.NOTIFY": 2,
"A.PRECAUTION": 2
},
"O": {
"O.AUTH": 7,
"O.COMMS": 6,
"O.CONFIG": 6,
"O.INTEGRITY": 5,
"O.STORAGE": 4
},
"OE": {
"OE.CONFIG": 2,
"OE.NOTIFY": 2,
"OE.PRECAUTION": 2
},
"T": {
"T.EAVESDROP": 4,
"T.FLAWAPP": 5,
"T.NETWORK": 4,
"T.PERSISTENT": 5,
"T.PHYSICAL": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.1": 8
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 11,
"AGD_PRE": 3,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMC.1": 5,
"ALC_CMC.2": 1,
"ALC_CMS": 2,
"ALC_CMS.1": 1,
"ALC_CMS.2": 4,
"ALC_TSU_EXT": 3,
"ALC_TSU_EXT.1": 4,
"ALC_TSU_EXT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND": 6,
"ATE_IND.1": 5
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 6
}
},
"cc_security_level": {
"EAL": {
"EAL1": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_SEL": 2,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 1,
"FAU_STG": 2,
"FAU_STG_EXT.1": 2,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1
},
"FCS": {
"FCS_ACF_EXT.1": 1,
"FCS_CKM": 2,
"FCS_CKM.1": 12,
"FCS_CKM.1.1": 6,
"FCS_CKM.2": 2,
"FCS_CKM.2.1": 1,
"FCS_CKM_EXT.1": 7,
"FCS_CKM_EXT.2": 6,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.3": 8,
"FCS_CKM_EXT.3.1": 1,
"FCS_CKM_EXT.3.2": 1,
"FCS_CKM_EXT.4": 8,
"FCS_CKM_EXT.4.1": 3,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.5": 5,
"FCS_CKM_EXT.5.1": 1,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.6": 2,
"FCS_CKM_EXT.6.1": 1,
"FCS_COP": 2,
"FCS_COP.1": 24,
"FCS_COP.1.1": 10,
"FCS_DAR_EXT.3": 1,
"FCS_DTLS": 2,
"FCS_DTLS_EXT.1": 4,
"FCS_DTLS_EXT.1.1": 1,
"FCS_RBG": 4,
"FCS_RBG_EXT.1": 23,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 6,
"FCS_RBG_EXT.1.3": 1,
"FCS_RBG_EXT.1.4": 1,
"FCS_RBG_EXT.1.5": 1,
"FCS_SRV": 2,
"FCS_SRV_EXT.1": 2,
"FCS_SRV_EXT.1.1": 1,
"FCS_STG": 2,
"FCS_STG_EXT.1": 6,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.1.2": 1,
"FCS_STG_EXT.1.3": 1,
"FCS_STG_EXT.1.4": 3,
"FCS_STG_EXT.1.5": 2,
"FCS_STG_EXT.2": 13,
"FCS_STG_EXT.2.1": 1,
"FCS_STG_EXT.2.2": 1,
"FCS_STG_EXT.3": 4,
"FCS_STG_EXT.3.1": 1,
"FCS_STG_EXT.3.2": 1,
"FCS_TLS": 4,
"FCS_TLS_EXT.1": 10,
"FCS_TLS_EXT.1.1": 1,
"FCS_TLS_EXT.1.2": 2,
"FCS_TLS_EXT.2": 7,
"FCS_TLS_EXT.2.1": 1,
"FCS_TLS_EXT.2.2": 1
},
"FDP": {
"FDP_ACF": 4,
"FDP_ACF_EXT.1": 2,
"FDP_ACF_EXT.1.1": 1,
"FDP_ACF_EXT.1.2": 1,
"FDP_ACF_EXT.1.3": 1,
"FDP_DAR": 5,
"FDP_DAR_EXT.1": 4,
"FDP_DAR_EXT.1.1": 1,
"FDP_DAR_EXT.1.2": 2,
"FDP_DAR_EXT.2": 10,
"FDP_DAR_EXT.2.1": 2,
"FDP_DAR_EXT.2.2": 1,
"FDP_DAR_EXT.2.3": 1,
"FDP_DAR_EXT.2.4": 1,
"FDP_DAR_EXT.3": 1,
"FDP_IFC": 2,
"FDP_IFC.1.1": 1,
"FDP_IFC_EXT": 1,
"FDP_IFC_EXT.1": 2,
"FDP_IFC_EXT.1.1": 1,
"FDP_ITC_EXT.1": 1,
"FDP_STG": 2,
"FDP_STG_EXT.1": 3,
"FDP_STG_EXT.1.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 1,
"FIA_AFL_EXT.1": 2,
"FIA_AFL_EXT.1.1": 1,
"FIA_AFL_EXT.1.2": 1,
"FIA_BLT": 2,
"FIA_BLT_EXT.1": 2,
"FIA_BLT_EXT.1.1": 1,
"FIA_PAE": 2,
"FIA_PAE_EXT.1": 3,
"FIA_PMG": 2,
"FIA_PMG_EXT.1": 2,
"FIA_PMG_EXT.1.1": 1,
"FIA_TRT": 2,
"FIA_TRT_EXT.1": 3,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.7": 2,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.1": 4,
"FIA_UAU_EXT.1.1": 1,
"FIA_UAU_EXT.2": 4,
"FIA_UAU_EXT.2.1": 1,
"FIA_UAU_EXT.2.2": 1,
"FIA_UAU_EXT.3": 3
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 15,
"FMT_MOF.1.1": 9,
"FMT_POL": 2,
"FMT_POL_EXT.1": 3,
"FMT_SMF": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 21,
"FMT_SMF_EXT.1": 5
},
"FPT": {
"FPT_AEX": 2,
"FPT_AEX_EXT": 2,
"FPT_AEX_EXT.1": 3,
"FPT_AEX_EXT.1.1": 1,
"FPT_AEX_EXT.1.2": 1,
"FPT_AEX_EXT.1.3": 1,
"FPT_AEX_EXT.1.4": 1,
"FPT_AEX_EXT.2": 3,
"FPT_AEX_EXT.2.1": 1,
"FPT_AEX_EXT.2.2": 1,
"FPT_AEX_EXT.3": 2,
"FPT_AEX_EXT.3.1": 1,
"FPT_AEX_EXT.4": 2,
"FPT_AEX_EXT.4.1": 1,
"FPT_AEX_EXT.4.2": 1,
"FPT_BBD": 2,
"FPT_BBD_EXT.1": 4,
"FPT_BBD_EXT.1.1": 1,
"FPT_KST": 2,
"FPT_KST_EXT.1": 2,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 2,
"FPT_KST_EXT.2.1": 1,
"FPT_KST_EXT.3": 2,
"FPT_KST_EXT.3.1": 1,
"FPT_NOT": 2,
"FPT_NOT_EXT.1": 2,
"FPT_NOT_EXT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 2,
"FPT_STM.1.1": 1,
"FPT_TST": 4,
"FPT_TST_EXT.1": 2,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2": 9,
"FPT_TST_EXT.2.1": 1,
"FPT_TST_EXT.2.2": 3,
"FPT_TUD": 4,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.1": 3,
"FPT_TUD_EXT.1.2": 3,
"FPT_TUD_EXT.1.3": 3,
"FPT_TUD_EXT.1.4": 2,
"FPT_TUD_EXT.2": 5,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1,
"FPT_TUD_EXT.2.3": 4,
"FPT_TUD_EXT.2.4": 1,
"FPT_TUD_EXT.2.5": 7,
"FPT_TUD_EXT.2.6": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL_EXT.1": 5,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 3,
"FTA_TAB.1.1": 1,
"FTA_TAB_EXT.1": 3,
"FTA_WSE": 2,
"FTA_WSE_EXT.1": 4,
"FTA_WSE_EXT.1.1": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC_EXT.1": 6,
"FTP_ITC_EXT.1.1": 2,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. 3.1.4 T.FLAWAPP Malicious or Flawed Application Applications loaded": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 6
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 6
},
"OFB": {
"OFB": 1
},
"XEX": {
"XEX": 2
},
"XTS": {
"XTS": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"IPsec": {
"IPsec": 21
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 12,
"DTLS 1.0": 2,
"DTLS 1.2": 3
},
"TLS": {
"TLS": 30,
"TLS 1.0": 3,
"TLS 1.1": 2,
"TLS 1.2": 6
}
},
"VPN": {
"VPN": 36
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 18,
"P-284": 6,
"P-384": 6,
"P-521": 18
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 4
},
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 3,
"SHA-384": 4,
"SHA-512": 3,
"SHA256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RBG": 49,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 5,
"FIPS PUB 186-4": 7,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-132": 2,
"NIST SP 800-38A": 1,
"NIST SP 800-38C": 2,
"NIST SP 800-38E": 1,
"NIST SP 800-38F": 4,
"NIST SP 800-56A": 1,
"NIST SP 800-57": 1,
"NIST SP 800-57A": 1,
"SP 800-108": 1,
"SP 800-38A": 5,
"SP 800-38B": 1,
"SP 800-38C": 2,
"SP 800-38D": 1,
"SP 800-38E": 1,
"SP 800-38F": 1,
"SP 800-56A": 1,
"SP 800-90A": 6
},
"RFC": {
"RFC 2246": 2,
"RFC 2560": 1,
"RFC 2818": 1,
"RFC 2986": 2,
"RFC 4346": 2,
"RFC 4347": 3,
"RFC 5216": 3,
"RFC 5246": 12,
"RFC 5280": 4,
"RFC 5289": 4,
"RFC 5759": 1,
"RFC 6347": 3,
"RFC 6460": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31,
"AES-": 1,
"AES-128": 1,
"AES-256": 1
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 8,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 3,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 2
}
},
"vendor": {
"Microsoft": {
"Microsoft Corporation": 1
},
"Samsung": {
"Samsung": 1
}
},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20140218150220-05\u002700\u0027",
"/ModDate": "D:20140218150220-05\u002700\u0027",
"pdf_file_size_bytes": 1636015,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 134
},
"report_filename": "pp_md_v1.1-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.NOTIFY": 1,
"A.PRECAUTION": 1
},
"D": {
"D": 1
},
"O": {
"O.AUTH": 1,
"O.COMMS": 1,
"O.CONFIG": 1,
"O.INTEGRITY": 1,
"O.STORAGE": 1
},
"OE": {
"OE.CONFIG": 1,
"OE.NOTIFY": 1,
"OE.PRECAUTION": 1
},
"T": {
"T.EAVESDROP": 1,
"T.FLAWAPP": 1,
"T.NETWORK": 1,
"T.PERSISTENT": 1,
"T.PHYSICAL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_TSU_EXT": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SEL": 1,
"FAU_STG_EXT": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 3,
"FCS_CKM_EXT": 6,
"FCS_COP.1": 5,
"FCS_DTLS_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 1,
"FCS_SRV_EXT": 1,
"FCS_STG_EXT": 3,
"FCS_TLS_EXT": 2
},
"FDP": {
"FDP_ACF_EXT": 1,
"FDP_ACF_EXT.1": 2,
"FDP_DAR_EXT": 2,
"FDP_IFC_EXT": 1,
"FDP_STG_EXT.1": 1
},
"FIA": {
"FIA_AFL_EXT": 1,
"FIA_BLT_EXT": 1,
"FIA_PAE_EXT": 1,
"FIA_PMG_EXT": 1,
"FIA_TRT_EXT": 1,
"FIA_UAU": 1,
"FIA_UAU_EXT": 3
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_POL_EXT": 1,
"FMT_SMF": 1,
"FMT_SMF_EXT": 1
},
"FPT": {
"FPT_AEX_EXT": 4,
"FPT_AEX_EXT.1": 1,
"FPT_AEX_EXT.2": 1,
"FPT_BBD_EXT": 1,
"FPT_KST_EXT": 3,
"FPT_NOT_EXT": 1,
"FPT_STM": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.2": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL_EXT": 1,
"FTA_TAB": 1,
"FTA_WSE_EXT": 1
},
"FTP": {
"FTP_ITC_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 10
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 23
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Aerospace Corporation",
"/Company": "The Aerospace Corporation",
"/CreationDate": "D:20141117144655-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20141117144704-05\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20141117193954",
"pdf_file_size_bytes": 166558,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "80e22d91a4a562dcacef6768567f74c07fce1b8ff0d220b8274c0726fcc3773c",
"txt_hash": "14da054c6b68bc3392fe319a2868280242274e19bd91f5e0ed8784b6d7c3f96c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "557a8263afb691278e772c768ad9f2693d3cc358627df8641d16fb29fe8ddb7b",
"txt_hash": "9084482b5d8948e68892eb8c01a8bd1466609ed8dabe99d08f6829f41010806f"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Mobility",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Mobile Device Fundamentals Version 1.1",
"not_valid_after": "2015-03-17",
"not_valid_before": "2014-02-18",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v1.1-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "HTTP/1.1"
}
}