This page was not yet optimized for use on mobile
devices.
collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201
Web information
| Status | active |
|---|---|
| Valid from | 01.02.2019 |
| Scheme | ❌ None |
| Category | Data Protection |
| Security level | None |
Certification report
Extracted keywords
Symmetric Algorithms
AESRandomness
RBGTrusted Execution Environments
SSCClaims
T.UNAUTHORIZED_DATA, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT, FCS_KYC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_COP.1, FCS_KDF_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FDP_DSK_EXT, FMT_SMF, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_FAC_EXT, FPT_RBP_EXT, FPT_FUA_EXTEvaluation facilities
Gossamer Security, LeidosFile metadata
| Creation date | D:20190506161100-04'00' |
|---|---|
| Modification date | D:20190506161100-04'00' |
| Pages | 15 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-256, SHA-384, SHA-512Randomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCM, XEX, XTSClaims
T.UNAUTHORIZED_DATA_ACCESS, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.POWER_DOWN, OE.STRONG_ENVIRONMENT_CRYPTO, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN, AVA_VAN.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT.6, FCS_KYC_EXT.2, FCS_SNI_EXT.1, FCS_VAL_EXT.1, FCS_COP.1, FCS_KDF_EXT.1, FCS_RBG_EXT.1, FCS_SMC_EXT.1, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.6.1, FCS_KYC_EXT.2.1, FCS_KYC_EXT.2.2, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_SNI_EXT.1.3, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_COP, FCS_CKM, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SMC_EXT.1.1, FCS_KYC_EXT.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FDP_DSK_EXT.1, FDP_DSK_EXT, FDP_DSK_EXT.1.1, FDP_DSK_EXT.1.2, FMT_SMF.1, FMT_SMF.1.1, FPT_KYP_EXT.1, FPT_PWR_EXT.1, FPT_PWR_EXT.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FAC_EXT.1, FPT_RBP_EXT.1, FPT_FUA_EXT.1, FPT_FAC_EXT, FPT_FUA_EXT, FPT_KYP_EXT, FPT_PWR_EXT, FPT_RBP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1.1, FPT_PWR_EXT.1.1, FPT_PWR_EXT.2.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_FAC_EXT.1.1, FPT_RBP_EXT.1.1, FPT_RBP_EXT.1.2, FPT_FUA_EXT.1.1, FPT_FUA_EXT.1.2, FPT_FUA_EXT.1.3, FPT_FUA_EXT.1.4Standards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-90, NIST SP 800-38B, SP 800-38B, NIST SP 800-38F, NIST SP 800-56B, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, PKCS #1, ISO/IEC 19772, ISO/IEC 26, ISO/IEC 14888-3, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 30, ISO/IEC 7, ISO/IEC 10116, ISO/IEC 18031:2011, ISO/IEC 18031:2011 23, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Creation date | D:20190221151852-05'00' |
|---|---|
| Modification date | D:20190221151852-05'00' |
| Pages | 75 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- ASURRE-Stor(TM) Solid State Self-Encrypting Drive Hardware revision 3.0, Firmware revision 1.5.1 archived
- Ampex Software Full Drive Encryption active
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15 archived
- Apple macOS 13 Ventura: FileVault archived
- Apple macOS 14 Sonoma: FileVault active
- Archon Linux Unified Key Setup (LUKS) v3.0.0.2 active
- CNS4 Hardware Encryption Layer vA1 archived
- CNS4 Software Encryption Layer vA1 archived
- Cigent PBA Software with Cigent M.2 2230 PCIe Gen 4 Self-Encrypting Drive (SED) active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.4 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Hardware Encryption Layer version 1.1.0 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Software Encryption Layer v1.01.00 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.0.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.01.00 active
- Curtiss-Wright Defense Solutions HSR10 CSfC Software Encryption Layer v1.1.0 active
- Curtiss-Wright Defense Solutions XMC NVMe Encryptor version 1.0.0 active
- DIGISTOR TCG OPAL SSC FIPS SSD Series, firmware version SCPG13.0/ECPG13.0/ECPM13.1 active
- DTS1 Hardware Encryption Layer v1.0 archived
- DTS1 Software Encryption Layer v1.0 archived
- Galleon Embedded Computing XSR and G1 Hardware Encryption Layer archived
- Galleon Embedded Computing XSR and G1 Software Encryption Layer archived
- KLC Advantech Drives, Firmware Version: SCPB13.0/ECPB13.0 active
- KLC Group LLC CipherDriveOne Kryptr 1.1.0 active
- L3Harris Common Data Loader Version 02.01 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.14.1 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.7P13 archived
- SSD Drives, Firmware Versions: SCPU13.0/ECPU13.0/SCQU15.0/ECQU15.0 active
- Scalar and Express P-series SSD, version NV.R1900 archived
- Scalar and Express P-series SSD, version NV.R1900 active
- Seagate Secure® TCG Opal and Enterprise SSC Self-Encrypting Drives archived
- Seagate Secure® TCG SSC Self-Encrypting Drives archived
- Seagate® BarraCuda™ 515 SSD, Firmware version ECPM13.1 archived
- Seagate® Secure NVMe Self-Encrypting Drives active
- Shift5, Inc. Software Full Drive Encryption active
- UD Info DB Series SSD Drives, Firmware Version: EIQM50.0 active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "9b51621665ff7223",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "9b51621665ff7223",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_FDE_EE_V2.0E.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 2,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 2,
"A.TRAINED_USER": 4,
"A.TRUSTED_CHANNEL": 2
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 2,
"OE.PASSPHRASE_STRENGTH": 2,
"OE.PHYSICAL": 2,
"OE.PLATFORM_STATE": 2,
"OE.POWER_DOWN": 2,
"OE.SINGLE_USE_ET": 2,
"OE.STRONG_ENVIRONMENT_CRYPTO": 3,
"OE.TRAINED_USERS": 2,
"OE.TRUSTED_CHANNEL": 2
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 2,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 4
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 4
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 3
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 29,
"FCS_CKM.1.1": 3,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 5,
"FCS_CKM_EXT": 4,
"FCS_CKM_EXT.4": 16,
"FCS_CKM_EXT.4.1": 3,
"FCS_CKM_EXT.6": 7,
"FCS_CKM_EXT.6.1": 2,
"FCS_COP": 2,
"FCS_COP.1": 128,
"FCS_COP.1.1": 7,
"FCS_KDF_EXT": 4,
"FCS_KDF_EXT.1": 12,
"FCS_KDF_EXT.1.1": 2,
"FCS_KYC_EXT": 5,
"FCS_KYC_EXT.1": 6,
"FCS_KYC_EXT.1.1": 1,
"FCS_KYC_EXT.1.2": 1,
"FCS_KYC_EXT.2": 18,
"FCS_KYC_EXT.2.1": 2,
"FCS_KYC_EXT.2.2": 2,
"FCS_RBG_EXT": 7,
"FCS_RBG_EXT.1": 20,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 4,
"FCS_SMC_EXT": 4,
"FCS_SMC_EXT.1": 17,
"FCS_SMC_EXT.1.1": 2,
"FCS_SNI_EXT": 4,
"FCS_SNI_EXT.1": 17,
"FCS_SNI_EXT.1.1": 2,
"FCS_SNI_EXT.1.2": 2,
"FCS_SNI_EXT.1.3": 3,
"FCS_VAL_EXT": 4,
"FCS_VAL_EXT.1": 16,
"FCS_VAL_EXT.1.1": 2,
"FCS_VAL_EXT.1.2": 2,
"FCS_VAL_EXT.1.3": 2
},
"FDP": {
"FDP_DSK_EXT": 4,
"FDP_DSK_EXT.1": 11,
"FDP_DSK_EXT.1.1": 2,
"FDP_DSK_EXT.1.2": 2
},
"FMT": {
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FAC_EXT": 4,
"FPT_FAC_EXT.1": 8,
"FPT_FAC_EXT.1.1": 2,
"FPT_FUA_EXT": 5,
"FPT_FUA_EXT.1": 13,
"FPT_FUA_EXT.1.1": 2,
"FPT_FUA_EXT.1.2": 2,
"FPT_FUA_EXT.1.3": 2,
"FPT_FUA_EXT.1.4": 2,
"FPT_KYP_EXT": 4,
"FPT_KYP_EXT.1": 11,
"FPT_KYP_EXT.1.1": 2,
"FPT_PWR_EXT": 4,
"FPT_PWR_EXT.1": 14,
"FPT_PWR_EXT.1.1": 4,
"FPT_PWR_EXT.2": 11,
"FPT_PWR_EXT.2.1": 2,
"FPT_RBP_EXT": 4,
"FPT_RBP_EXT.1": 6,
"FPT_RBP_EXT.1.1": 3,
"FPT_RBP_EXT.1.2": 2,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 5,
"FPT_TUD_EXT.1": 14,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 4,
"FPT_TUD_EXT.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 9
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 9,
"SHA-384": 7,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RBG": 20,
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 186-4": 1,
"FIPS PUB 186-4": 5
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10118": 2,
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 6,
"ISO/IEC 18031:2011 23": 1,
"ISO/IEC 18033-3": 1,
"ISO/IEC 19772": 6,
"ISO/IEC 26": 2,
"ISO/IEC 30": 2,
"ISO/IEC 7": 2
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-132": 2,
"NIST SP 800-38B": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 2,
"NIST SP 800-90A": 1,
"SP 800-38B": 1
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 23,
"AES-128": 2,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 3,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20190221151852-05\u002700\u0027",
"/ModDate": "D:20190221151852-05\u002700\u0027",
"pdf_file_size_bytes": 1453293,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
},
"report_filename": "cpp_fde_ee_v2.0E-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 1,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 1,
"A.TRAINED_USER": 1,
"A.TRUSTED_CHANNEL": 1
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 1,
"OE.PASSPHRASE_STRENGTH": 1,
"OE.PHYSICAL": 1,
"OE.POWER_DOWN": 1,
"OE.SINGLE_USE_ET": 1,
"OE.TRAINED_USERS": 1,
"OE.TRUSTED_CHANNEL": 1
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA": 1,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 3,
"FCS_CKM.4": 5,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 7,
"FCS_KDF_EXT": 1,
"FCS_KYC_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_SMC_EXT": 1,
"FCS_SNI_EXT": 1,
"FCS_VAL_EXT": 1
},
"FDP": {
"FDP_DSK_EXT": 1
},
"FMT": {
"FMT_SMF": 1
},
"FPT": {
"FPT_FAC_EXT": 1,
"FPT_FUA_EXT": 1,
"FPT_KYP_EXT": 1,
"FPT_PWR_EXT": 2,
"FPT_RBP_EXT": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
},
"Leidos": {
"Leidos": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 55
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20190506161100-04\u002700\u0027",
"/ModDate": "D:20190506161100-04\u002700\u0027",
"pdf_file_size_bytes": 925320,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "31a4ba2ee276672933a7a100e4eb871431ed5049f2709abc2f3accd3a3b55e4f",
"txt_hash": "b182da81255e351aa18c3b0e4876bf268c7d29e1861f591d88532a4fd41725c6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0c3d0dfaf55113abdc67d78828791b18178ab378594e98bb51802d32b7c11b4e",
"txt_hash": "9ac4b032a778ed76e8a283e57930933b6ca2e2b926251937497d2e62304f10c3"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201",
"not_valid_after": null,
"not_valid_before": "2019-02-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V2.0E.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_fde_ee_v2.0E-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "2.0E"
}
}