This page was not yet optimized for use on mobile devices.
collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201
Web information
Status: activeCertification date: 2019-02-01
Scheme: ❌
Category: Data Protection
Security level: None
Certification report
Extracted keywords
Symmetric Algorithms
AESRandomness
RBGTrusted Execution Environments
SSCClaims
T.UNAUTHORIZED_DATA, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT, FCS_KYC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_COP.1, FCS_KDF_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FDP_DSK_EXT, FMT_SMF, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_FAC_EXT, FPT_RBP_EXT, FPT_FUA_EXTEvaluation facilities
Gossamer Security, LeidosFile metadata
Creation date | D:20190506161100-04'00' |
---|---|
Modification date | D:20190506161100-04'00' |
Pages | 15 |
Profile
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-256, SHA-384, SHA-512Randomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCM, XEX, XTSClaims
T.UNAUTHORIZED_DATA_ACCESS, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.POWER_DOWN, OE.STRONG_ENVIRONMENT_CRYPTO, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN, AVA_VAN.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT.6, FCS_KYC_EXT.2, FCS_SNI_EXT.1, FCS_VAL_EXT.1, FCS_COP.1, FCS_KDF_EXT.1, FCS_RBG_EXT.1, FCS_SMC_EXT.1, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.6.1, FCS_KYC_EXT.2.1, FCS_KYC_EXT.2.2, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_SNI_EXT.1.3, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_COP, FCS_CKM, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SMC_EXT.1.1, FCS_KYC_EXT.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FDP_DSK_EXT.1, FDP_DSK_EXT, FDP_DSK_EXT.1.1, FDP_DSK_EXT.1.2, FMT_SMF.1, FMT_SMF.1.1, FPT_KYP_EXT.1, FPT_PWR_EXT.1, FPT_PWR_EXT.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FAC_EXT.1, FPT_RBP_EXT.1, FPT_FUA_EXT.1, FPT_FAC_EXT, FPT_FUA_EXT, FPT_KYP_EXT, FPT_PWR_EXT, FPT_RBP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1.1, FPT_PWR_EXT.1.1, FPT_PWR_EXT.2.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_FAC_EXT.1.1, FPT_RBP_EXT.1.1, FPT_RBP_EXT.1.2, FPT_FUA_EXT.1.1, FPT_FUA_EXT.1.2, FPT_FUA_EXT.1.3, FPT_FUA_EXT.1.4Standards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-90, NIST SP 800-38B, SP 800-38B, NIST SP 800-38F, NIST SP 800-56B, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, PKCS #1, ISO/IEC 19772, ISO/IEC 26, ISO/IEC 14888-3, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 30, ISO/IEC 7, ISO/IEC 10116, ISO/IEC 18031:2011, ISO/IEC 18031:2011 23, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20190221151852-05'00' |
---|---|
Modification date | D:20190221151852-05'00' |
Pages | 75 |
References
- ASURRE-Stor(TM) Solid State Self-Encrypting Drive Hardware revision 3.0, Firmware revision 1.5.1 archived
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15 archived
- Apple macOS 13 Ventura: FileVault active
- Apple macOS 14 Sonoma: FileVault active
- Archon Linux Unified Key Setup (LUKS) v3.0.0.2 active
- CNS4 Hardware Encryption Layer vA1 archived
- CNS4 Software Encryption Layer vA1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.4 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Hardware Encryption Layer version 1.1.0 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Software Encryption Layer v1.01.00 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.0.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.01.00 active
- Curtiss-Wright Defense Solutions HSR10 CSfC Software Encryption Layer v1.1.0 active
- Curtiss-Wright Defense Solutions XMC NVMe Encryptor version 1.0.0 active
- DIGISTOR TCG OPAL SSC FIPS SSD Series, firmware version SCPG13.0/ECPG13.0/ECPM13.1 active
- DTS1 Hardware Encryption Layer v1.0 archived
- DTS1 Software Encryption Layer v1.0 archived
- Galleon Embedded Computing XSR and G1 Hardware Encryption Layer active
- Galleon Embedded Computing XSR and G1 Software Encryption Layer archived
- KLC Advantech Drives, Firmware Version: SCPB13.0/ECPB13.0 active
- KLC Group LLC CipherDriveOne Kryptr 1.1.0 active
- L3Harris Common Data Loader Version 02.01 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.14.1 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.7P13 archived
- SSD Drives, Firmware Versions: SCPU13.0/ECPU13.0/SCQU15.0/ECQU15.0 active
- Scalar and Express P-series SSD, version NV.R1900 archived
- Scalar and Express P-series SSD, version NV.R1900 active
- Seagate Secure® TCG Opal and Enterprise SSC Self-Encrypting Drives archived
- Seagate Secure® TCG SSC Self-Encrypting Drives archived
- Seagate® BarraCuda™ 515 SSD, Firmware version ECPM13.1 archived
- Seagate® Secure NVMe Self-Encrypting Drives active
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 925320, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20190506161100-04'00'", '/ModDate': "D:20190506161100-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 1453293, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 75, '/CreationDate': "D:20190221151852-05'00'", '/ModDate': "D:20190221151852-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/']}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'APE': {'APE_REQ': 1, 'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.1': 1, 'APE_REQ.1': 1, 'APE_SPD.1': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 3, 'FCS_CKM.4': 5, 'FCS_CKM_EXT.4': 2, 'FCS_CKM_EXT': 1, 'FCS_KYC_EXT': 1, 'FCS_SNI_EXT': 1, 'FCS_VAL_EXT': 1, 'FCS_COP.1': 7, 'FCS_KDF_EXT': 1, 'FCS_RBG_EXT': 1, 'FCS_SMC_EXT': 1}, 'FDP': {'FDP_DSK_EXT': 1}, 'FMT': {'FMT_SMF': 1}, 'FPT': {'FPT_KYP_EXT': 1, 'FPT_PWR_EXT': 2, 'FPT_TST_EXT': 1, 'FPT_TUD_EXT': 1, 'FPT_FAC_EXT': 1, 'FPT_RBP_EXT': 1, 'FPT_FUA_EXT': 1}}, 'cc_claims': {'T': {'T.UNAUTHORIZED_DATA': 1, 'T.KEYING_MATERIAL_COMPROMISE': 1, 'T.AUTHORIZATION_GUESSING': 1, 'T.KEYSPACE_EXHAUST': 1, 'T.KNOWN_PLAINTEXT': 1, 'T.CHOSEN_PLAINTEXT': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.UNAUTHORIZED_FIRMWARE_UPDATE': 1, 'T.UNAUTHORIZED_FIRMWARE_MODIFY': 1}, 'A': {'A.TRUSTED_CHANNEL': 1, 'A.INITIAL_DRIVE_STATE': 1, 'A.TRAINED_USER': 1, 'A.PLATFORM_STATE': 1, 'A.POWER_DOWN': 1, 'A.STRONG_CRYPTO': 1, 'A.PHYSICAL': 1}, 'OE': {'OE.TRUSTED_CHANNEL': 1, 'OE.INITIAL_DRIVE_STATE': 1, 'OE.PASSPHRASE_STRENGTH': 1, 'OE.POWER_DOWN': 1, 'OE.SINGLE_USE_ET': 1, 'OE.TRAINED_USERS': 1, 'OE.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {'Gossamer': {'Gossamer Security': 4}, 'Leidos': {'Leidos': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 55}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 4}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_CMC.1': 4, 'ALC_CMS.1': 4}, 'ATE': {'ATE_IND.1': 3, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 3, 'AVA_VAN.1': 3}, 'APE': {'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.1': 1, 'APE_REQ.1': 1, 'APE_SPD.1': 1}, 'ASE': {'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4}, 'FCS': {'FCS_CKM.1': 29, 'FCS_CKM.4': 22, 'FCS_CKM_EXT.4': 16, 'FCS_CKM_EXT.6': 7, 'FCS_KYC_EXT.2': 18, 'FCS_SNI_EXT.1': 17, 'FCS_VAL_EXT.1': 16, 'FCS_COP.1': 128, 'FCS_KDF_EXT.1': 12, 'FCS_RBG_EXT.1': 20, 'FCS_SMC_EXT.1': 17, 'FCS_CKM_EXT': 4, 'FCS_KDF_EXT': 4, 'FCS_KYC_EXT': 5, 'FCS_RBG_EXT': 7, 'FCS_SMC_EXT': 4, 'FCS_SNI_EXT': 4, 'FCS_VAL_EXT': 4, 'FCS_CKM.1.1': 3, 'FCS_CKM.4.1': 5, 'FCS_CKM_EXT.4.1': 3, 'FCS_CKM_EXT.6.1': 2, 'FCS_KYC_EXT.2.1': 2, 'FCS_KYC_EXT.2.2': 2, 'FCS_SNI_EXT.1.1': 2, 'FCS_SNI_EXT.1.2': 2, 'FCS_SNI_EXT.1.3': 3, 'FCS_VAL_EXT.1.1': 2, 'FCS_VAL_EXT.1.2': 2, 'FCS_VAL_EXT.1.3': 2, 'FCS_COP': 2, 'FCS_CKM': 1, 'FCS_COP.1.1': 7, 'FCS_KDF_EXT.1.1': 2, 'FCS_RBG_EXT.1.1': 3, 'FCS_RBG_EXT.1.2': 4, 'FCS_SMC_EXT.1.1': 2, 'FCS_KYC_EXT.1': 6, 'FCS_KYC_EXT.1.1': 1, 'FCS_KYC_EXT.1.2': 1}, 'FDP': {'FDP_DSK_EXT.1': 11, 'FDP_DSK_EXT': 4, 'FDP_DSK_EXT.1.1': 2, 'FDP_DSK_EXT.1.2': 2}, 'FMT': {'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_KYP_EXT.1': 11, 'FPT_PWR_EXT.1': 14, 'FPT_PWR_EXT.2': 11, 'FPT_TST_EXT.1': 11, 'FPT_TUD_EXT.1': 14, 'FPT_FAC_EXT.1': 8, 'FPT_RBP_EXT.1': 6, 'FPT_FUA_EXT.1': 13, 'FPT_FAC_EXT': 4, 'FPT_FUA_EXT': 5, 'FPT_KYP_EXT': 4, 'FPT_PWR_EXT': 4, 'FPT_RBP_EXT': 4, 'FPT_TST_EXT': 4, 'FPT_TUD_EXT': 5, 'FPT_KYP_EXT.1.1': 2, 'FPT_PWR_EXT.1.1': 4, 'FPT_PWR_EXT.2.1': 2, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 4, 'FPT_TUD_EXT.1.3': 2, 'FPT_FAC_EXT.1.1': 2, 'FPT_RBP_EXT.1.1': 3, 'FPT_RBP_EXT.1.2': 2, 'FPT_FUA_EXT.1.1': 2, 'FPT_FUA_EXT.1.2': 2, 'FPT_FUA_EXT.1.3': 2, 'FPT_FUA_EXT.1.4': 2}}, 'cc_claims': {'T': {'T.UNAUTHORIZED_DATA_ACCESS': 2, 'T.KEYING_MATERIAL_COMPROMISE': 1, 'T.AUTHORIZATION_GUESSING': 1, 'T.KEYSPACE_EXHAUST': 1, 'T.KNOWN_PLAINTEXT': 1, 'T.CHOSEN_PLAINTEXT': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.UNAUTHORIZED_FIRMWARE_UPDATE': 1, 'T.UNAUTHORIZED_FIRMWARE_MODIFY': 1}, 'A': {'A.TRUSTED_CHANNEL': 2, 'A.INITIAL_DRIVE_STATE': 1, 'A.TRAINED_USER': 4, 'A.PLATFORM_STATE': 2, 'A.POWER_DOWN': 1, 'A.STRONG_CRYPTO': 2, 'A.PHYSICAL': 1}, 'OE': {'OE.TRUSTED_CHANNEL': 2, 'OE.INITIAL_DRIVE_STATE': 2, 'OE.PASSPHRASE_STRENGTH': 2, 'OE.SINGLE_USE_ET': 2, 'OE.TRAINED_USERS': 2, 'OE.PLATFORM_STATE': 2, 'OE.POWER_DOWN': 2, 'OE.STRONG_ENVIRONMENT_CRYPTO': 3, 'OE.PHYSICAL': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23, 'AES-128': 2, 'AES-256': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 9, 'SHA-384': 7, 'SHA-512': 6}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 3, 'RBG': 20}}, 'cipher_mode': {'CBC': {'CBC': 5}, 'GCM': {'GCM': 9}, 'CCM': {'CCM': 2}, 'XEX': {'XEX': 1}, 'XTS': {'XTS': 6}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-384': 8, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 5, 'FIPS 186-4': 1}, 'NIST': {'NIST SP 800-90': 2, 'NIST SP 800-38B': 1, 'SP 800-38B': 1, 'NIST SP 800-38F': 1, 'NIST SP 800-56B': 1, 'NIST SP 800-108': 2, 'NIST SP 800-132': 2, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS #1': 1}, 'ISO': {'ISO/IEC 19772': 6, 'ISO/IEC 26': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 10118': 2, 'ISO/IEC 18033-3': 1, 'ISO/IEC 30': 2, 'ISO/IEC 7': 2, 'ISO/IEC 10116': 2, 'ISO/IEC 18031:2011': 6, 'ISO/IEC 18031:2011 23': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '31a4ba2ee276672933a7a100e4eb871431ed5049f2709abc2f3accd3a3b55e4f', 'txt_hash': 'b182da81255e351aa18c3b0e4876bf268c7d29e1861f591d88532a4fd41725c6'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0c3d0dfaf55113abdc67d78828791b18178ab378594e98bb51802d32b7c11b4e', 'txt_hash': '9ac4b032a778ed76e8a283e57930933b6ca2e2b926251937497d2e62304f10c3'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201 was processed.
Raw data
{
"_id": "9b51621665ff7223",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "9b51621665ff7223",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_FDE_EE_V2.0E.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 2,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 2,
"A.TRAINED_USER": 4,
"A.TRUSTED_CHANNEL": 2
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 2,
"OE.PASSPHRASE_STRENGTH": 2,
"OE.PHYSICAL": 2,
"OE.PLATFORM_STATE": 2,
"OE.POWER_DOWN": 2,
"OE.SINGLE_USE_ET": 2,
"OE.STRONG_ENVIRONMENT_CRYPTO": 3,
"OE.TRAINED_USERS": 2,
"OE.TRUSTED_CHANNEL": 2
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 2,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 4
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 4
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 3
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 29,
"FCS_CKM.1.1": 3,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 5,
"FCS_CKM_EXT": 4,
"FCS_CKM_EXT.4": 16,
"FCS_CKM_EXT.4.1": 3,
"FCS_CKM_EXT.6": 7,
"FCS_CKM_EXT.6.1": 2,
"FCS_COP": 2,
"FCS_COP.1": 128,
"FCS_COP.1.1": 7,
"FCS_KDF_EXT": 4,
"FCS_KDF_EXT.1": 12,
"FCS_KDF_EXT.1.1": 2,
"FCS_KYC_EXT": 5,
"FCS_KYC_EXT.1": 6,
"FCS_KYC_EXT.1.1": 1,
"FCS_KYC_EXT.1.2": 1,
"FCS_KYC_EXT.2": 18,
"FCS_KYC_EXT.2.1": 2,
"FCS_KYC_EXT.2.2": 2,
"FCS_RBG_EXT": 7,
"FCS_RBG_EXT.1": 20,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 4,
"FCS_SMC_EXT": 4,
"FCS_SMC_EXT.1": 17,
"FCS_SMC_EXT.1.1": 2,
"FCS_SNI_EXT": 4,
"FCS_SNI_EXT.1": 17,
"FCS_SNI_EXT.1.1": 2,
"FCS_SNI_EXT.1.2": 2,
"FCS_SNI_EXT.1.3": 3,
"FCS_VAL_EXT": 4,
"FCS_VAL_EXT.1": 16,
"FCS_VAL_EXT.1.1": 2,
"FCS_VAL_EXT.1.2": 2,
"FCS_VAL_EXT.1.3": 2
},
"FDP": {
"FDP_DSK_EXT": 4,
"FDP_DSK_EXT.1": 11,
"FDP_DSK_EXT.1.1": 2,
"FDP_DSK_EXT.1.2": 2
},
"FMT": {
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FAC_EXT": 4,
"FPT_FAC_EXT.1": 8,
"FPT_FAC_EXT.1.1": 2,
"FPT_FUA_EXT": 5,
"FPT_FUA_EXT.1": 13,
"FPT_FUA_EXT.1.1": 2,
"FPT_FUA_EXT.1.2": 2,
"FPT_FUA_EXT.1.3": 2,
"FPT_FUA_EXT.1.4": 2,
"FPT_KYP_EXT": 4,
"FPT_KYP_EXT.1": 11,
"FPT_KYP_EXT.1.1": 2,
"FPT_PWR_EXT": 4,
"FPT_PWR_EXT.1": 14,
"FPT_PWR_EXT.1.1": 4,
"FPT_PWR_EXT.2": 11,
"FPT_PWR_EXT.2.1": 2,
"FPT_RBP_EXT": 4,
"FPT_RBP_EXT.1": 6,
"FPT_RBP_EXT.1.1": 3,
"FPT_RBP_EXT.1.2": 2,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 5,
"FPT_TUD_EXT.1": 14,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 4,
"FPT_TUD_EXT.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 9
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 9,
"SHA-384": 7,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RBG": 20,
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 186-4": 1,
"FIPS PUB 186-4": 5
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10118": 2,
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 6,
"ISO/IEC 18031:2011 23": 1,
"ISO/IEC 18033-3": 1,
"ISO/IEC 19772": 6,
"ISO/IEC 26": 2,
"ISO/IEC 30": 2,
"ISO/IEC 7": 2
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-132": 2,
"NIST SP 800-38B": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 2,
"NIST SP 800-90A": 1,
"SP 800-38B": 1
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 23,
"AES-128": 2,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 3,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20190221151852-05\u002700\u0027",
"/ModDate": "D:20190221151852-05\u002700\u0027",
"pdf_file_size_bytes": 1453293,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
},
"report_filename": "cpp_fde_ee_v2.0E-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 1,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 1,
"A.TRAINED_USER": 1,
"A.TRUSTED_CHANNEL": 1
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 1,
"OE.PASSPHRASE_STRENGTH": 1,
"OE.PHYSICAL": 1,
"OE.POWER_DOWN": 1,
"OE.SINGLE_USE_ET": 1,
"OE.TRAINED_USERS": 1,
"OE.TRUSTED_CHANNEL": 1
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA": 1,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 3,
"FCS_CKM.4": 5,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 7,
"FCS_KDF_EXT": 1,
"FCS_KYC_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_SMC_EXT": 1,
"FCS_SNI_EXT": 1,
"FCS_VAL_EXT": 1
},
"FDP": {
"FDP_DSK_EXT": 1
},
"FMT": {
"FMT_SMF": 1
},
"FPT": {
"FPT_FAC_EXT": 1,
"FPT_FUA_EXT": 1,
"FPT_KYP_EXT": 1,
"FPT_PWR_EXT": 2,
"FPT_RBP_EXT": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
},
"Leidos": {
"Leidos": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 55
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20190506161100-04\u002700\u0027",
"/ModDate": "D:20190506161100-04\u002700\u0027",
"pdf_file_size_bytes": 925320,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "31a4ba2ee276672933a7a100e4eb871431ed5049f2709abc2f3accd3a3b55e4f",
"txt_hash": "b182da81255e351aa18c3b0e4876bf268c7d29e1861f591d88532a4fd41725c6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0c3d0dfaf55113abdc67d78828791b18178ab378594e98bb51802d32b7c11b4e",
"txt_hash": "9ac4b032a778ed76e8a283e57930933b6ca2e2b926251937497d2e62304f10c3"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201",
"not_valid_after": null,
"not_valid_before": "2019-02-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V2.0E.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_fde_ee_v2.0E-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "2.0E"
}
}