This page was not yet optimized for use on mobile devices.
FIDO Universal Second Factor (U2F) Authenticator
CSV information ?
Status: activeCertification date: 2018-12-18 00:00:00
Archived date: 2029-12-18 00:00:00
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Frontpage information ?
Protection Profile ID: BSI-CC-PP-0096-V3-2018Title: FIDO Universal Second Factor (U2F) Authenticator
Version: Version 3 (Nov 5th , 2018
Security level: Minimum assurance level for this PP is EAL4 augmented
Protection profile ?
Extracted keywords
Algorithms
RNGVendor
STMicroelectronics, Infineon, NXPProtection profiles
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, BSI-CC-PP-0084-2014, BSI-CC-PP-0096-V3-2018, BSI-PP-CC-0096-V3-2018Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ATE_DPT.1, AVA_VAN.5Security Functional Requirements (SFR)
FCS_CKM, FCS_RNG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.5, FCS_COP.1, FCS_RNG.1, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1, FIA_SOS.2, FIA_UAU.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPR_ANO.1, FPT_EMS, FPT_EMS.1, FPT_PHP.3, FPT_TST.1References ?
No references are available for this protection profile.
Raw data
{
"_id": "a3d0207e058ff199ff7b",
"csv_scan": {
"cc_archived_date": "2029-12-18 00:00:00",
"cc_category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cc_certification_date": "2018-12-18 00:00:00",
"cc_pp_name": "FIDO Universal Second Factor (U2F) Authenticator",
"cc_pp_version": "3",
"cc_security_level": "EAL4+",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/pp0096V3b_pdf.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/pp0096V3a_pdf.pdf",
"maintainance_updates": [],
"scheme": "DE"
},
"frontpage_scan": [
{
"cc_security_level": "Minimum assurance level for this PP is EAL4 augmented",
"cc_version": "3.1 (Revision 5",
"keywords": "FIDO, U2F 1.2",
"match_rules": [
"PP Reference.+?Title (?P\u003cpp_title\u003e.+)?CC Version (?P\u003ccc_version\u003e.+)?Assurance Level (?P\u003ccc_security_level\u003e.+)?General Status (?P\u003cpp_general_status\u003e.+)?Version Number (?P\u003cpp_version_number\u003e.+)?Registration (?P\u003cpp_id\u003e.+)?Keywords (?P\u003ckeywords\u003e.+)?TOE Overview"
],
"pp_general_status": "final",
"pp_id": "BSI-CC-PP-0096-V3-2018",
"pp_registrator_simplified": "BSI",
"pp_title": "FIDO Universal Second Factor (U2F) Authenticator",
"pp_version_number": "Version 3 (Nov 5th , 2018"
}
],
"keywords_scan": {
"block_cipher_modes": {},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {},
"rules_cplc": {},
"rules_crypto_algs": {
"RN[GD]": {
"RNG": {
"count": 15
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {
"DPA": {
"DPA": {
"count": 1
}
},
"SPA": {
"SPA": {
"count": 1
}
},
"[Pp]hysical [Pp]robing": {
"physical probing": {
"count": 1
}
},
"[Ss]ide.channels?": {
"side channel": {
"count": 4
},
"side channels": {
"count": 1
}
},
"[pP]hysical [tT]ampering": {
"Physical tampering": {
"count": 1
},
"physical tampering": {
"count": 1
}
}
},
"rules_device_id": {},
"rules_ecc_curves": {},
"rules_javacard": {},
"rules_os": {},
"rules_other": {},
"rules_protection_profiles": {
"BSI-(?:CC[-_]|)PP[-_]*.+?": {
"BSI-CC-PP-0084-2014": {
"count": 1
},
"BSI-CC-PP-0096-V3-2018": {
"count": 1
},
"BSI-PP-CC-0096-V3-2018": {
"count": 1
}
},
"CCMB-20[0-9]+?-[0-9]+?-[0-9]+?": {
"CCMB-2017-04-001": {
"count": 2
},
"CCMB-2017-04-002": {
"count": 2
},
"CCMB-2017-04-003": {
"count": 2
},
"CCMB-2017-04-004": {
"count": 1
}
}
},
"rules_security_assurance_components": {
"ADV_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ADV_ARC.1": {
"count": 2
},
"ADV_FSP.4": {
"count": 2
},
"ADV_IMP.1": {
"count": 2
},
"ADV_TDS.3": {
"count": 2
}
},
"AGD_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AGD_OPE.1": {
"count": 2
},
"AGD_PRE.1": {
"count": 2
}
},
"ATE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ATE_DPT.1": {
"count": 2
}
},
"AVA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AVA_VAN.5": {
"count": 4
}
}
},
"rules_security_functional_components": {
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_CKM": {
"count": 2
},
"FCS_CKM.1": {
"count": 9
},
"FCS_CKM.2": {
"count": 4
},
"FCS_CKM.4": {
"count": 14
},
"FCS_CKM.5": {
"count": 5
},
"FCS_COP.1": {
"count": 8
},
"FCS_RNG": {
"count": 4
},
"FCS_RNG.1": {
"count": 14
}
},
"FDP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FDP_ACC.1": {
"count": 4
},
"FDP_IFC.1": {
"count": 9
},
"FDP_IFF.1": {
"count": 5
},
"FDP_ITC.1": {
"count": 3
},
"FDP_ITC.2": {
"count": 3
},
"FDP_SDI.1": {
"count": 3
}
},
"FIA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FIA_SOS.2": {
"count": 1
},
"FIA_UAU.1": {
"count": 1
},
"FIA_UAU.2": {
"count": 8
},
"FIA_UAU.6": {
"count": 8
},
"FIA_UID.1": {
"count": 2
}
},
"FMT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FMT_MSA.1": {
"count": 5
},
"FMT_MSA.3": {
"count": 5
},
"FMT_MTD.1": {
"count": 6
},
"FMT_SMF.1": {
"count": 15
},
"FMT_SMR.1": {
"count": 21
}
},
"FPR_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPR_ANO.1": {
"count": 2
}
},
"FPT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPT_EMS": {
"count": 4
},
"FPT_EMS.1": {
"count": 7
},
"FPT_PHP.3": {
"count": 3
},
"FPT_TST.1": {
"count": 5
}
}
},
"rules_security_level": {
"EAL[ ]*[0-9+]+?": {
"EAL4": {
"count": 10
}
},
"EAL[ ]*[0-9] augmented+?": {
"EAL4 augmented": {
"count": 2
}
}
},
"rules_standard_id": {},
"rules_technical_reports": {},
"rules_vendor": {
"(?:STMicroelectronics|STM)": {
"STMicroelectronics": {
"count": 1
}
},
"Infineon": {
"Infineon": {
"count": 1
}
},
"NXP": {
"NXP": {
"count": 1
}
}
},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"separate_profiles": []
},
"processed": {
"cc_pp_csvid": [],
"cert_id": ""
}
}