This page was not yet optimized for use on mobile devices.
Department of Defense Public Key Infrastructures and Key Management Infrastructures Token Protection Profile (Medium Robustness), Version 3.0
Web information
Status: archivedCertification date: 2002-03-22
Archived date: 2008-03-21
Scheme: 🇺🇸
Category: Key Management Systems
Security level: EAL4+
Certification report
Extracted keywords
Schemes
Key Exchange, Key exchangeSecurity level
EAL4, EAL 4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADV_FSP.2, ADV_IMP.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.3, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, AVA_VLA.3, AVA_MSU.2Certificates
CCEVS-VR-02-0017Side-channel analysis
Physical Probing, physical probingStandards
FIPS 140-2, X.509File metadata
Title | VID2009_VR_V1.0.doc |
---|---|
Author | awlewis |
Creation date | D:20021119095823 |
Pages | 11 |
Creator | Microsoft Word - VID2009_VR_V1.0.doc |
Producer | Acrobat PDFWriter 5.0 for Windows NT |
Profile
Extracted keywords
Symmetric Algorithms
AES, DES, SkipjackAsymmetric Algorithms
RSA 2048, Diffie-Hellman, DSAHash functions
SHA-1Schemes
Key Exchange, Key exchangeSecurity level
EAL4, EAL4 augmentedClaims
D.C, O.DACSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_LLD, ADV_RCR, ADV_SPM, ADV_FSP.1, ADV_HLD.1, ADV_INT.1, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.1, ALC_LCD.1, ALC_TAT.3, ALC_TAT.1, ALC_DVS, ALC_LCD, ALC_TAT, ALC_TAT.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3, AVA_VLA.2, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.4, AVA_TAT.3, AVA_CCA.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_SEL.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_IFF.3, FDP_ITC.1, FDP_ITT.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_IFF.3.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITT.1.1, FDP_RIP.1.1, FDP_UIT.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_REV.1, FMT_SMR.2, FMT_SMR.3, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3.1, FPT_AMT.1, FPT_FLS.1, FPT_ITI.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP.3, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_TST.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_RCV.4.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_RCV.3, FPT_RPL.1, FRU_RSA.1, FRU_RSA.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Evaluation facilities
Booz Allen HamiltonSide-channel analysis
Physical Probing, physical probing, Physical probing, SPA, DPA, timing attacks, physical tampering, Physical tampering, malfunction, DFA, reverse engineering, Reverse engineeringStandards
FIPS 140-2, PKCS15, PKCS 15, X.509File metadata
Title | DoD PKI and KMI Token Protection Profile (Medium Robustmess), Version 3, 22 Mar 2002 |
---|---|
Keywords | DoDPKI&KMI Token.(PP), ProtectionProfile,Medium Robustmess |
Author | |
Creation date | D:20020515124912Z |
Modification date | D:20031211134044-05'00' |
Pages | 176 |
Creator | Microsoft Word 9.0 |
Producer | Acrobat Distiller 4.05 for Windows |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 49833, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 11, '/Creator': 'Microsoft Word - VID2009_VR_V1.0.doc', '/CreationDate': 'D:20021119095823', '/Title': 'VID2009_VR_V1.0.doc', '/Author': 'awlewis', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 872269, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 176, '/Producer': 'Acrobat Distiller 4.05 for Windows', '/Creator': 'Microsoft Word 9.0', '/ModDate': "D:20031211134044-05'00'", '/Author': ' ', '/Title': 'DoD PKI and KMI Token Protection Profile (Medium Robustmess), Version 3, 22 Mar 2002', '/CreationDate': 'D:20020515124912Z', '/Keywords': 'DoDPKI&KMI Token.(PP), ProtectionProfile,Medium Robustmess', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/cc/sc/sclist.htm', 'http://csrc.nist.gov/cc', 'http://www.csrc.nist.gov/cc', 'mailto:[email protected]', 'http://cctoolbox.sparta.com/', 'http://csrc.nist.gov/encryption/skipjack/skipjack-kea.htm', 'http://www.iatf.net/']}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-02-0017': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL 4': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_IMP.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1}, 'ALC': {'ALC_TAT.3': 2, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VLA.3': 2, 'AVA_MSU.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KEX': {'Key Exchange': 2, 'Key exchange': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 1, 'physical probing': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 3}, 'X509': {'X.509': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 34, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 13, 'ACM_CAP.4': 26, 'ACM_SCP.2': 11, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1, 'ACM_CAP.3': 1}, 'ADO': {'ADO_DEL.2': 18, 'ADO_IGS.1': 11, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_FSP.2': 13, 'ADV_HLD.2': 20, 'ADV_IMP.1': 16, 'ADV_LLD.1': 22, 'ADV_RCR.1': 11, 'ADV_SPM.1': 17, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1, 'ADV_FSP.1': 9, 'ADV_HLD.1': 2, 'ADV_INT.1': 1}, 'AGD': {'AGD_ADM.1': 22, 'AGD_USR.1': 19, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.1': 15, 'ALC_LCD.1': 10, 'ALC_TAT.3': 23, 'ALC_TAT.1': 3, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 9, 'ATE_DPT.1': 8, 'ATE_FUN.1': 16, 'ATE_IND.2': 10, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.2': 17, 'AVA_SOF.1': 10, 'AVA_VLA.3': 27, 'AVA_VLA.2': 3, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_VLA.4': 1, 'AVA_TAT.3': 1, 'AVA_CCA.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 2, 'FAU_SAA.1': 1, 'FAU_SEL.1': 1}, 'FCS': {'FCS_CKM.1': 21, 'FCS_CKM.2': 14, 'FCS_CKM.3': 17, 'FCS_CKM.4': 20, 'FCS_COP.1': 10, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 2, 'FCS_CKM.3.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_ACC.1': 19, 'FDP_ACF.1': 14, 'FDP_DAU.1': 10, 'FDP_ETC.1': 11, 'FDP_IFC.1': 10, 'FDP_IFF.1': 9, 'FDP_IFF.3': 7, 'FDP_ITC.1': 11, 'FDP_ITT.1': 11, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_IFF.3.1': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 4, 'FDP_ITT.1.1': 1, 'FDP_RIP.1.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_AFL.1': 11, 'FIA_ATD.1': 7, 'FIA_SOS.1': 11, 'FIA_UAU.1': 12, 'FIA_UAU.6': 10, 'FIA_UAU.7': 8, 'FIA_UID.2': 10, 'FIA_UAU.1.2': 2, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 8, 'FMT_MSA.2': 11, 'FMT_MSA.3': 10, 'FMT_MTD.1': 8, 'FMT_MTD.2': 6, 'FMT_MTD.3': 6, 'FMT_REV.1': 6, 'FMT_SMR.2': 13, 'FMT_SMR.3': 8, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MTD.3.1': 1, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3.1': 1}, 'FPT': {'FPT_AMT.1': 8, 'FPT_FLS.1': 13, 'FPT_ITI.1': 7, 'FPT_ITT.1': 8, 'FPT_PHP.1': 10, 'FPT_PHP.3': 19, 'FPT_RCV.4': 7, 'FPT_RVM.1': 7, 'FPT_SEP.1': 7, 'FPT_TST.1': 7, 'FPT_AMT.1.1': 1, 'FPT_FLS.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_RCV.3': 1, 'FPT_RPL.1': 1}, 'FRU': {'FRU_RSA.1': 7, 'FRU_RSA.1.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.C': 3}, 'O': {'O.DAC': 23}}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 6}}, 'miscellaneous': {'Skipjack': {'Skipjack': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 16, 'Key exchange': 4}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 3, 'physical probing': 8, 'Physical probing': 1, 'SPA': 6, 'DPA': 8, 'timing attacks': 1}, 'FI': {'physical tampering': 11, 'Physical tampering': 1, 'malfunction': 3, 'DFA': 1}, 'other': {'reverse engineering': 4, 'Reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 34}, 'PKCS': {'PKCS15': 1, 'PKCS 15': 1}, 'X509': {'X.509': 14}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9d36e69cf424e7a37d39c224f17480abb86d7e4dc083d1c8517ec0f7641ef44a', 'txt_hash': 'ecb2d81f47212d821f0485684459a169431699fd2ffe6c53a9f1005c2215c2c8'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1e2f705d5ccd0ad088b2637be2ad50d82d4ad56f2af4e3851ed4458d63be207d', 'txt_hash': '30d2470b2838745d90b316b362219a98d618fe8a49bb442797bffac55526bf5d'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Department of Defense Public Key Infrastructures and Key Management Infrastructures Token Protection Profile (Medium Robustness), Version 3.0 was processed.
Raw data
{
"_id": "fcc10f1804aed709",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "fcc10f1804aed709",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_PKIKMI_TKN_MR_V3.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"D": {
"D.C": 3
},
"O": {
"O.DAC": 23
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 13,
"ACM_CAP": 1,
"ACM_CAP.3": 1,
"ACM_CAP.4": 26,
"ACM_SCP": 1,
"ACM_SCP.2": 11
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 18,
"ADO_IGS": 1,
"ADO_IGS.1": 11
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 9,
"ADV_FSP.2": 13,
"ADV_HLD": 1,
"ADV_HLD.1": 2,
"ADV_HLD.2": 20,
"ADV_IMP": 1,
"ADV_IMP.1": 16,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 22,
"ADV_RCR": 1,
"ADV_RCR.1": 11,
"ADV_SPM": 1,
"ADV_SPM.1": 17
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 22,
"AGD_USR": 1,
"AGD_USR.1": 19
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.1": 15,
"ALC_LCD": 1,
"ALC_LCD.1": 10,
"ALC_TAT": 1,
"ALC_TAT.1": 3,
"ALC_TAT.2": 1,
"ALC_TAT.3": 23
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 9,
"ATE_DPT": 1,
"ATE_DPT.1": 8,
"ATE_FUN": 1,
"ATE_FUN.1": 16,
"ATE_IND": 1,
"ATE_IND.2": 10
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 1,
"AVA_MSU.2": 17,
"AVA_SOF": 1,
"AVA_SOF.1": 10,
"AVA_TAT.3": 1,
"AVA_VLA": 1,
"AVA_VLA.2": 3,
"AVA_VLA.3": 27,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 34,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_SAA.1": 1,
"FAU_SEL.1": 1
},
"FCS": {
"FCS_CKM.1": 21,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 14,
"FCS_CKM.2.1": 2,
"FCS_CKM.3": 17,
"FCS_CKM.3.1": 2,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 10,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 10,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC.1": 11,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 9,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.1.6": 1,
"FDP_IFF.3": 7,
"FDP_IFF.3.1": 1,
"FDP_ITC.1": 11,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 4,
"FDP_ITT.1": 11,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_AFL.1": 11,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 11,
"FIA_SOS.1.1": 2,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 2,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 11,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 6,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_MTD.3": 6,
"FMT_MTD.3.1": 1,
"FMT_REV.1": 6,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMR.2": 13,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FMT_SMR.3": 8,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT.1": 8,
"FPT_AMT.1.1": 1,
"FPT_FLS.1": 13,
"FPT_FLS.1.1": 1,
"FPT_ITI.1": 7,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_PHP.1": 10,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 19,
"FPT_PHP.3.1": 1,
"FPT_RCV.3": 1,
"FPT_RCV.4": 7,
"FPT_RCV.4.1": 1,
"FPT_RPL.1": 1,
"FPT_RVM.1": 7,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_RSA.1": 7,
"FRU_RSA.1.1": 1
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 16,
"Key exchange": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BoozAllenHamilton": {
"Booz Allen Hamilton": 5
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Physical tampering": 1,
"malfunction": 3,
"physical tampering": 11
},
"SCA": {
"DPA": 8,
"Physical Probing": 3,
"Physical probing": 1,
"SPA": 6,
"physical probing": 8,
"timing attacks": 1
},
"other": {
"Reverse engineering": 2,
"reverse engineering": 4
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 34
},
"PKCS": {
"PKCS 15": 1,
"PKCS15": 1
},
"X509": {
"X.509": 14
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 6
}
},
"miscellaneous": {
"Skipjack": {
"Skipjack": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": " ",
"/CreationDate": "D:20020515124912Z",
"/Creator": "Microsoft Word 9.0",
"/Keywords": "DoDPKI\u0026KMI Token.(PP), ProtectionProfile,Medium Robustmess",
"/ModDate": "D:20031211134044-05\u002700\u0027",
"/Producer": "Acrobat Distiller 4.05 for Windows",
"/Title": "DoD PKI and KMI Token Protection Profile (Medium Robustmess), Version 3, 22 Mar 2002",
"pdf_file_size_bytes": 872269,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/encryption/skipjack/skipjack-kea.htm",
"mailto:[email protected]",
"http://csrc.nist.gov/cc/sc/sclist.htm",
"http://www.iatf.net/",
"http://csrc.nist.gov/cc",
"http://cctoolbox.sparta.com/",
"http://www.csrc.nist.gov/cc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 176
},
"report_filename": "PP_PKIKMI_TKN_MR_V3.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-02-0017": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_IMP.1": 1,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_TAT.3": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_VLA.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2,
"Key exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"Physical Probing": 1,
"physical probing": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "awlewis",
"/CreationDate": "D:20021119095823",
"/Creator": "Microsoft Word - VID2009_VR_V1.0.doc",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "VID2009_VR_V1.0.doc",
"pdf_file_size_bytes": 49833,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9d36e69cf424e7a37d39c224f17480abb86d7e4dc083d1c8517ec0f7641ef44a",
"txt_hash": "ecb2d81f47212d821f0485684459a169431699fd2ffe6c53a9f1005c2215c2c8"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1e2f705d5ccd0ad088b2637be2ad50d82d4ad56f2af4e3851ed4458d63be207d",
"txt_hash": "30d2470b2838745d90b316b362219a98d618fe8a49bb442797bffac55526bf5d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Key Management Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Department of Defense Public Key Infrastructures and Key Management Infrastructures Token Protection Profile (Medium Robustness), Version 3.0",
"not_valid_after": "2008-03-21",
"not_valid_before": "2002-03-22",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_PKIKMI_TKN_MR_V3.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_PKIKMI_TKN_MR_V3.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "3.0"
}
}