This page was not yet optimized for use on mobile
devices.
collaborative Protection Profile for Full Drive Encryption – Authorization Acquisition v1.0
Web information
| Status | active |
|---|---|
| Valid from | 27.02.2015 |
| Scheme | ❌ None |
| Category | Data Protection |
| Security level | None |
Certification report
Extracted keywords
Symmetric Algorithms
AESRandomness
RBGClaims
T.KEYING_MATERIAL_COMPROMISE, T.UNAUTHORIZED_DATA_ACCESS, T.UNAUTHORIZED_UPDATE, A.INITIAL_DRIVE_STATE, A.TRUSTED_CHANNEL, A.TRAINED_USER, A.PLATFORM_STATE, A.SINGLE_USE_ET, A.POWER_DOWN, A.PASSWORD_STRENGTH, A.STRONG_CRYPTO, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.STRONG_ENVIRONMENT_CRYPTO, OE.PLATFORM_STATESecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_AFA_EXT, FCS_KYC_EXT, FCS_CKM_EXT, FCS_CKM, FCS_SNI_EXT, FCS_CKM.1, FCS_COP.1, FCS_SMC_EXT, FCS_VAL_EXT, FCS_KDF_EXT.1, FCS_RBG_EXT, FCS_PCC_EXT, FMT_SMF, FPT_KYP_EXT, FPT_TUD_EXT, FPT_TST_EXTEvaluation facilities
UL Verification ServicesFile metadata
| Author | McGeady, Megan [USA] |
|---|---|
| Creation date | D:20170914085932-04'00' |
| Modification date | D:20170914085934-04'00' |
| Pages | 12 |
| Creator | Acrobat PDFMaker 11 for Word |
| Producer | Adobe PDF Library 11.0 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-256, SHA-512, SHA-224, SHA-384, PBKDF2, PBKDFRandomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCM, XEX, XTSClaims
T.UNAUTHORIZED_DATA_ACCESS, T.KEYING_MATERIAL_COMPROMISE, T.UNAUTHORIZED_UPDATE, T.AUTHORIZATION_GUESSING, A.SECURE_STATE, A.TRUSTED_CHANNEL, A.TRAINED_USER, A.PLATFORM_STATE, A.SINGLE_USE_ET, A.POWER_DOWN, A.PASSWORD_STRENGTH, A.STRONG_CRYPTO, OE.INITIAL_DRIVE_STATE, OE.POWER_DOWN, OE.TRUSTED_CHANNEL, OE.PASSPHRASE_STRENGTH, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.STRONG_ENVIRONMENT_CRYPTOSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VAN, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_AFA_EXT.1, FCS_KYC_EXT.1, FCS_CKM_EXT.4, FCS_CKM.4, FCS_SNI_EXT.1, FCS_CKM.1, FCS_SMC_EXT.1, FCS_VAL_EXT.1, FCS_COP.1, FCS_KDF_EXT.1, FCS_RBG_EXT.1, FCS_PCC_EXT.1, FCS_AFA_EXT.1.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FCS_SMC_EXT.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_VAL_EXT.1.1, FCS_AFA, FCS_CKM_EXT.4.1, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_SNI_EXT.1.3, FCS_CKM.2.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_COP.1.1, FCS_COP, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.1, FCS_PCC_EXT.1.1, FCS_AFA_EXT, FCS_KYC_EXT, FCS_PCC_EXT, FCS_CKM, FCS_SNI_EXT, FCS_CKM_EXT, FCS_KYC_EXT.2, FCS_SMC_EXT, FCS_VAL_EXT, FCS_KDF_EXT, FCS_RBG_EXT, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FPT_KYP_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_KYP_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1, FPT_KYP_EXT, FPT_TUD_EXT, FPT_TST_EXTStandards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-90, NIST SP 800-38F, NIST SP 800-56B, NIST SP 800-108, NIST SP 800-90A, NIST SP 800-132, PKCS #1, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 10118-, ISO/IEC 9797-, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 19772, ISO/IEC 10116, ISO/IEC 18031:2011, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Creation date | D:20150227114243-05'00' |
|---|---|
| Modification date | D:20150227114250-05'00' |
| Pages | 62 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "dc3ab206bf47162b",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "dc3ab206bf47162b",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_FDE_AA_V1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PASSWORD_STRENGTH": 1,
"A.PLATFORM_STATE": 3,
"A.POWER_DOWN": 2,
"A.SECURE_STATE": 1,
"A.SINGLE_USE_ET": 1,
"A.STRONG_CRYPTO": 2,
"A.TRAINED_USER": 5,
"A.TRUSTED_CHANNEL": 2
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 2,
"OE.PASSPHRASE_STRENGTH": 3,
"OE.PLATFORM_STATE": 3,
"OE.POWER_DOWN": 4,
"OE.SINGLE_USE_ET": 3,
"OE.STRONG_ENVIRONMENT_CRYPTO": 2,
"OE.TRAINED_USERS": 2,
"OE.TRUSTED_CHANNEL": 2
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 2,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 4
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 4
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 3
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 3
},
"FCS": {
"FCS_AFA": 2,
"FCS_AFA_EXT": 1,
"FCS_AFA_EXT.1": 8,
"FCS_AFA_EXT.1.1": 4,
"FCS_CKM": 1,
"FCS_CKM.1": 3,
"FCS_CKM.1.1": 3,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 4,
"FCS_CKM.4.1": 4,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 12,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 71,
"FCS_COP.1.1": 7,
"FCS_KDF_EXT": 2,
"FCS_KDF_EXT.1": 12,
"FCS_KYC_EXT": 2,
"FCS_KYC_EXT.1": 15,
"FCS_KYC_EXT.1.1": 6,
"FCS_KYC_EXT.1.2": 6,
"FCS_KYC_EXT.2": 1,
"FCS_PCC_EXT": 2,
"FCS_PCC_EXT.1": 13,
"FCS_PCC_EXT.1.1": 2,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 20,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 4,
"FCS_SMC_EXT": 2,
"FCS_SMC_EXT.1": 13,
"FCS_SMC_EXT.1.1": 3,
"FCS_SNI_EXT": 2,
"FCS_SNI_EXT.1": 9,
"FCS_SNI_EXT.1.1": 2,
"FCS_SNI_EXT.1.2": 2,
"FCS_SNI_EXT.1.3": 3,
"FCS_VAL_EXT": 2,
"FCS_VAL_EXT.1": 13,
"FCS_VAL_EXT.1.1": 6,
"FCS_VAL_EXT.1.2": 4,
"FCS_VAL_EXT.1.3": 4
},
"FMT": {
"FMT_SMF": 2,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 7
},
"FPT": {
"FPT_KYP_EXT": 2,
"FPT_KYP_EXT.1": 9,
"FPT_KYP_EXT.1.1": 3,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 7,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 8,
"FPT_TUD_EXT.1.1": 4,
"FPT_TUD_EXT.1.2": 4,
"FPT_TUD_EXT.1.3": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 9
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 2,
"PBKDF2": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 8,
"SHA-384": 4,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 4
},
"RNG": {
"RBG": 21,
"RNG": 8
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 186-4": 1,
"FIPS PUB 186-4": 5
},
"ISO": {
"ISO/IEC 10116": 4,
"ISO/IEC 10118": 2,
"ISO/IEC 10118-": 1,
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 7,
"ISO/IEC 18033-3": 1,
"ISO/IEC 19772": 6,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-": 1
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-132": 3,
"NIST SP 800-38F": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 2,
"NIST SP 800-90A": 2
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16,
"AES-128": 2,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-256": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Company": "NDS",
"/CreationDate": "D:20150227114243-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20150227114250-05\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20150227164053",
"pdf_file_size_bytes": 428003,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 62
},
"report_filename": "cpp_fde_aa_v1.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PASSWORD_STRENGTH": 1,
"A.PLATFORM_STATE": 1,
"A.POWER_DOWN": 1,
"A.SINGLE_USE_ET": 1,
"A.STRONG_CRYPTO": 1,
"A.TRAINED_USER": 1,
"A.TRUSTED_CHANNEL": 1
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 1,
"OE.PASSPHRASE_STRENGTH": 1,
"OE.PLATFORM_STATE": 1,
"OE.POWER_DOWN": 1,
"OE.SINGLE_USE_ET": 1,
"OE.STRONG_ENVIRONMENT_CRYPTO": 1,
"OE.TRAINED_USERS": 1,
"OE.TRUSTED_CHANNEL": 1
},
"T": {
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_AFA_EXT": 1,
"FCS_CKM": 2,
"FCS_CKM.1": 1,
"FCS_CKM_EXT": 1,
"FCS_COP.1": 7,
"FCS_KDF_EXT.1": 1,
"FCS_KYC_EXT": 1,
"FCS_PCC_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_SMC_EXT": 1,
"FCS_SNI_EXT": 1,
"FCS_VAL_EXT": 1
},
"FMT": {
"FMT_SMF": 1
},
"FPT": {
"FPT_KYP_EXT": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"UL": {
"UL Verification Services": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "McGeady, Megan [USA]",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20170914085932-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/Keywords": "",
"/ModDate": "D:20170914085934-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20170914125917",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 155965,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "24dc6ac66aed16ed73a7a041e5a906b025dd49229f8bd435aa36b2151d443ebd",
"txt_hash": "204748b4abc72d0a77eac209f202cecf9c3da5746a24570828048600c3cd8a6d"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "8bfa0fa9ef630a1c0177a9641e730beac29956efe46f67d15a0a65d12719eb2a",
"txt_hash": "eeaac68758f2743f061d6678d867d064d454fdb3b1003a77b210d3334b9260ea"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile for Full Drive Encryption \u2013 Authorization Acquisition v1.0",
"not_valid_after": null,
"not_valid_before": "2015-02-27",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_fde_aa_v1.0-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "1.0"
}
}