Version | Date | Comment |
---|---|---|
1.0 | 2019-07-30 | Initial Release |
2.0 | 2025-01-31 | Update to CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Authorization factor (AF) | A value that a user knows, has, or is (e.g. password, token, etc.) submitted to the TOE to establish that the user is in the community authorized to access the requested material. |
Entropy Source | This cryptographic function provides a seed for a random bit generator by accumulating the outputs from one or more noise sources. The functionality includes a measure of the minimum work required to guess a given output and tests to ensure that the noise sources are operating properly. |
File Encryption Key (FEK) | The key that is used by the encryption algorithm to encrypt the selected user data on the host machine. |
File/Set of files | The user data that is selected to be encrypted, which can include individual file encryption (with a FEK per file) or a set of files encrypted with a single FEK. |
Key Chaining | The method of using multiple layers of encryption keys to protect data. A top layer key encrypts a lower layer key which encrypts the data; this method can have any number of layers. |
Key Encryption Key (KEK) | The key that is used to encrypt another key. |
Key Release Key | A key used to release another key from storage, it is not used for the direct derivation or decryption of another key. |
Key Sanitization | A method of sanitizing encrypted data by securely overwriting the key, as described in the key destruction requirement, that was encrypting the data. |
Keying Escrow | The process of exporting a key to an alternate location. |
Keying Material | Key material is commonly known as critical security parameter (CSP) data, and also includes authorization data, nonces, and metadata. |
Noise Source | The component of an RBG that contains the non-deterministic, entropy-producing activity. |
Non-Volatile Memory | A type of computer memory that will retain information without power. |
Powered-Off State | The device has been shut down. |
Protected Data | This refers to all files designated by the user for encryption. |
Random Bit Generator (RBG) | A cryptographic function composed of an entropy source and DRBG that is invoked for random bits needed to produce keying material. |
Recovery Value | A secondary credential that can be used to validate a user in the event the primary one is lost. |
Registration | The initial process of associating and endpoint and/or user with the server. |
Submask | A submask is a bit string that can be generated and stored in a number of ways |
System Identity | A composition of a series of identifiers that may vary, but aim to identity and associate with a specific system |
The application, which consists of the software provided by its vendor, is installed onto the platform(s) it operates on. It executes on the platform, which may be an operating system, hardware environment, a software based execution environment, or some combination of these. Those platforms may themselves run within other environments, such as virtual machines or operating systems, that completely abstract away the underlying hardware from the application. The TOE is not accountable for security functionality that is implemented by platform layers that are abstracted away. Some evaluation activities are specific to the particular platform on which the application runs, in order to provide precision and repeatability. The only platforms currently recognized by [AppPP] and this module are those specified in SFR Evaluation Activities. To test on a platform for which there are no EAs, a Vendor should contact NIAP with recommended EAs. NIAP will determine if the proposed platform is appropriate for the PP and accept, reject, or develop EAs as necessary in coordination with the technical community.
The TOE includes any software in the application installation package, even those pieces that may extend or modify the functionality of the underlying platform, such as kernel drivers. BIOS and other firmware, the operating system kernel, and other systems software (and drivers) provided as part of the platform are outside the scope of this document.
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Assumption or OSP | Security Objectives | Rationale |
A.ENVIRONMENTAL_STORAGE | OE.ENVIRONMENTAL_STORAGE | The operational environment objective OE.ENVIRONMENTAL_STORAGE is realized through A.ENVIRONMENTAL_STORAGE. |
A.PHYSICAL_SERVER | OE.PHYSICAL_SERVER | The operational environment objective OE.PHYSICAL_SERVER is realized through A.PHYSICAL_SERVER. |
A.SECURED_CONFIGURATION | OE.SECURED_CONFIGURATION | The operational environment objective OE.SECURED_CONFIGURATION is realized through A.SECURED_CONFIGURATION. |
A.SECURED_ENVIRONMENT | OE.SECURED_ENVIRONMENT | The operational environment objective OE.SECURED_ENVIRONMENT is realized through A.SECURED_ENVIRONMENT. |
This SFR is modified from its definition in the Base-PP by removing the first selection (where the application does not transmit any data or sensitive data). By definition, a TOE that conforms to this PP-Module must have the ability to transmit sensitive data to another trusted IT product.
The text of the requirement is replaced with:
The application shall [selection:
] for [assignment: function(s)] using certificates as defined in the Functional Package for X.509
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.KEYING_MATERIAL_COMPROMISE_SERVER | FCS_CKM.1/SK (from Base-PP) | Mitigates the threat by securely generating symmetric encryption keys. |
FCS_CKM.1 (from Base-PP) | Mitigates the threat by securely generating asymmetric encryption keys. | |
FCS_CKM.2 (from Base-PP) | Mitigates the threat by securely establishing cryptographic keys between entities. | |
FCS_IV_EXT.1 | Mitigates the threat by securely and unpredictably generating IVs. | |
FTP_DIT_EXT.1 (modified from Base-PP) | Mitigates the threat by encrypting data transmitted to an external entity. | |
FCS_CKM.6 | Mitigates the threat by securely destroying keys and key material when no longer needed. | |
FCS_KYC_EXT.1 | Mitigates the threat by securely storing keys & key chain material. | |
FPT_KYP_EXT.1 | Mitigates the threat by limiting the situations in which plaintext keys may be stored, and storing the keys protected in all other situations. | |
FIA_AUT_EXT.1 | Mitigates the threat by authorizing a user based on a secure credential. | |
FMT_MOF.1 | Mitigates the threat by restricting the ability to manage encryption parameters to administrators. | |
FMT_SMF.1/FEEM | Mitigates the threat by restricting the ability to manage the Management Server to administrators. | |
FPT_ITT.1 | Mitigates the threat by protecting data transmitted within different parts of the TOE. | |
FCS_COP.1/KW (selection-based) | Mitigates the threat by securely wrapping cryptographic keys using a cryptographic algorithm. | |
FCS_COP.1/KT (selection-based) | Mitigates the threat by securely transmitting keys using a cryptographic algorithm. | |
FCS_KDF_EXT.1 (selection-based) | Mitigates the threat by securely deriving cryptographic keys. | |
FCS_SMC_EXT.1 (selection-based) | Mitigates the threat by securely generating intermediate keys by combining submasks. | |
T.MAN_IN_THE_MIDDLE | FTP_DIT_EXT.1 (modified from Base-PP) | Mitigates the threat by encrypting sensitive or all data transmitted to an external entity. |
FCS_CKM.1 (from Base-PP) | Mitigates the threat by securely generating asymmetric encryption keys. | |
FCS_COP.1/SKC (from Base-PP) | Mitigates the threat by utilizing symmetric encryption in communications between servers and clients. | |
FCS_COP.1/Sig (from Base-PP) | Mitigates the threat by cryptographically signing communications between servers and clients. | |
FCS_RBG_EXT.1 (from Base-PP)" | Mitigates the threat by using a secure RBG to support secure communication. | |
FIA_X509_EXT.1 (from Base-PP)" | Mitigates the threat by preventing connection to servers or clients with malformed or invalid X.509 certificates. | |
FIA_X509_EXT.2 (from Base-PP) | Mitigates the threat by authenticating entities using X.509 certificates. | |
FPT_ITT.1 | Mitigates the threat by encrypting data transmitted between different parts of the TOE. | |
FCS_CKM_EXT.6 (selection-based) | Mitigates the threat by conditioning passwords or other credentials to an unreadable form. | |
FTP_TRP.1 (selection-based) | Mitigates the threat by protecting communication with an appropriate secure protocol. | |
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS | FCS_VAL_EXT.1/Admin | Mitigates the threat by validating the administrator before allowing any administrative actions. |
FIA_UAU.1 | Mitigates the threat by limiting the administrative actions that can be taken before the authentication process must succeed. | |
FIA_UID.1 | Mitigates the threat by limiting the administrative actions that can be taken before the identification process must succeed. | |
FCS_VAL_EXT.2/Admin (selection-based) | Mitigates the threat by preventing excessive unsuccessful validation attempts. | |
T.UNAUTHORIZED_DATA_ACCESS_ENDPOINT | FPT_KYP_EXT.2 | Mitigates the threat by associating keys to user identities and providing a method for revocation of the association. |
T.UNAUTHORIZED_DATA_ACCESS_SERVER | FCS_COP.1/SKC (from Base-PP) | Mitigates the threat by identifying users with a securely-encrypted value. |
FIA_X509_EXT.1 (from Base-PP) | Mitigates the threat by preventing connection to servers or clients with malformed or invalid X.509 certificates. | |
FIA_X509_EXT.2 (from Base-PP) | Mitigates the threat by authenticating a remote entity using X.509 certificates. | |
FCS_VAL_EXT.1/User | Mitigates the threat by validating the user before decryption of any data or key. | |
FCS_VAL_EXT.2/User | Mitigates the threat by preventing excessive unsuccessful validation attempts. | |
FIA_REC_EXT.1 | Mitigates the threat by providing a secure recovery mechanism. | |
FIA_UAU.1 | Mitigates the threat by limiting the administrative actions that can be taken before the authentication process must succeed. | |
FIA_UID.1 | Mitigates the threat by limiting the administrative actions that can be taken before the identification process must succeed. | |
FMT_MTD.1 | Mitigates the threat by restricting the times at which certain cryptographic parameters can be modified on the server. | |
FMT_SMR.2 | Mitigates the threat by maintaining separate security roles for administrators and users. | |
FIA_CHR_EXT.1 (selection-based) | Mitigates the threat by providing a limited-time and limited-scope challenge-response recovery credential. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.KEYING_MATERIAL_COMPROMISE_SERVER | This threat is a specific example of T.PHYSICAL_ACCESS defined in the Base-PP. Specifically, this PP-Module defines a method of maliciously gaining access to sensitive data at rest that is particular to the technology type of this PP-Module. |
T.MAN_IN_THE_MIDDLE | This threat is a specific example of T.NETWORK_EAVESDROP defined in the Base-PP. Specifically, the attacker performs network eavesdropping to gain access to key data in transit between TOE components. |
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS | This threat is a variation on T.LOCAL_ATTACK defined in the Base-PP. The Base-PP does not define access-controlled management functions so this PP-Module goes beyond it by specifying misuse of the management interface as a threat to the TSF. |
T.UNTRUSTED_COMMUNICATION_CHANNELS | This threat is a variation on T.NETWORK_ATTACK and T.NETWORK_EAVESDROP defined in the Base-PP. The threat of untrusted communication channels allows for exploitation of the TSF in different ways, depending on how the lack of trust is manifested. |
T.UNAUTHORIZED_DATA_ACCESS_ENDPOINT | This threat is a variation on T.PHYSICAL_ACCESS defined in the Base-PP. In this case, the "sensitive data at rest" is the data that the TOE is intended to protect. |
T.UNAUTHORIZED_DATA_ACCESS_SERVER | This threat is a variation on T.PHYSICAL_ACCESS defined in the Base-PP. In this case, the "sensitive data at rest" is the data that the TOE is intended to protect. |
A.ENVIRONMENTAL_STORAGE | |
A.PHYSICAL_SERVER | |
A.SECURED_CONFIGURATION | |
A.SECURED_ENVIRONMENT |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.ENVIRONMENTAL_STORAGE | This objective is consistent with the Base-PP because the Base-PP allows for the TOE to use platform-provided key storage. |
OE.PHYSICAL_SERVER | This objective is consistent with the Base-PP because it is an extension of the Base-PP's OE.PLATFORM objective that is specific to this technology type. It is also consistent because the Base-PP permits the TSF to use platform-provided cryptography. |
OE.SECURED_CONFIGURATION | This objective is consistent with the Base-PP because it expects the TOE's operational guidance to be responsibly followed in the same manner as OE.PROPER_ADMIN in the Base-PP. |
OE.SECURED_ENVIRONMENT | This objective is consistent with the Base-PP because it is an extension of the Base-PP's OE.PLATFORM objective that is specific to this technology type. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FTP_DIT_EXT.1 | This SFR is defined in the Base-PP. This PP-Module modifies it by removing the option not to transmit sensitive data because this particular TOE type will always have that capability. It is still consistent with the Base-PP because all selections that the ST author is permitted to make are available options in the Base-PP version of the SFR. |
Additional SFRs | |
This PP-Module does not add any requirements when the App PP is the base. | |
Mandatory SFRs | |
FCS_CKM.6 | This SFR requires destruction of cryptographic keys when they are no longer needed. The Base-PP does not mandate key destruction but it also does not prohibit it. |
FCS_KYC_EXT.1 | The Base-PP defines how stored keys are protected. This SFR extends that functionality by defining the logical hierarchy of how keys are logically protected by other keys or other secret data. |
FCS_VAL_EXT.1/Admin | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can validate the correctness of data input to it. |
FCS_VAL_EXT.1/User | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can validate the correctness of data input to it. |
FCS_VAL_EXT.2/User | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can take security-relevant action if some data input to it is invalid. |
FIA_AUT_EXT.1 | This SFR defines how administrator requests to access protected data are authorized. It uses FCS_RBG_EXT.1 from the Base-PP in a manner consistent with its definition, but otherwise does not relate to functionality defined by the Base-PP. |
FIA_REC_EXT.1 | This SFR defines the TOE's potential support for recovery credentials. This functionality does not relate to any behavior defined in the Base-PP. |
FIA_UAU.1 | This SFR requires administrators to be authenticated prior to accessing management functionality. The Base-PP does not mandate identification and authentication measures for a management interface but it also does not prohibit them. |
FIA_UID.1 | This SFR requires administrators to be identified prior to accessing management functionality. The Base-PP does not mandate identification and authentication measures for a management interface but it also does not prohibit them. |
FMT_MOF.1 | This SFR defines access restrictions for TOE management functions. This is not defined in the Base-PP but there is nothing in the Base-PP that prohibits it. |
FMT_MTD.1 | This SFR defines access restrictions for management of TSF data. This is not defined in the Base-PP but there is nothing in the Base-PP that prohibits it. |
FMT_SMF.1/FEEM | This SFR defines management functions for the TOE for functionality specific to this PP-Module. These functions are defined in addition to what the Base-PP defines for its own operation. |
FMT_SMR.2 | This SFR defines administrative roles, which are used by other SFRs to derive privileges to interact with the TOE's management functionality. This is not defined in the Base-PP but there is nothing in the Base-PP that prohibits it. |
FPT_ITT.1 | This SFR uses a subset of the protocols defined in the Base-PP for secure communications. This PP-Module extends the functionality by explicitly defining a communications channel where both endpoints are TOE components. |
FPT_KYP_EXT.1 | The Base-PP defines an SFR for secure storage of sensitive data. This SFR expands on that definition by describing the supported logical methods for storage of key data. |
FPT_KYP_EXT.2 | This SFR relates to key attribution such that stored keys can be associated with the users that 'own' them. This does not relate to functionality that is defined in the Base-PP so it does not interfere with the implementation of any Base-PP SFRs. |
Optional SFRs | |
This PP-Module does not define any Optional requirements. | |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FCS_COP.1/KT | This SFR defines key transport functionality that is outside the scope of the original cryptographic operations defined in the Base-PP. |
FCS_COP.1/KW | This SFR defines usage of AES functionality not defined by the Base-PP. However, this functionality is only used in certain situations that are specific to this PP-Module and do not affect the ability of any Base-PP SFRs to be enforced. |
FCS_CKM_EXT.6 | This SFR defines a key derivation method based on passphrase conditioning. It uses the FCS_RBG_EXT.1 SFR from the Base-PP in its intended manner but otherwise does not relate to the Base-PP's functionality. |
FCS_KDF_EXT.1 | This SFR defines key transport functionality. It uses random bit generation and keyed-hash message authentication functionality from the Base-PP as they are intended but is otherwise outside the scope of the original cryptographic operations defined in the Base-PP. |
FCS_SMC_EXT.1 | This SFR relates to submask combining as a method of generating intermediate keys. Key hierarchy functionality is outside the scope of the Base-PP. |
FCS_VAL_EXT.2/Admin | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can take security-relevant action if some data input to it is invalid. |
FIA_CHR_EXT.1 | This SFR defines the TOE's implementation of recovery credentials. This functionality does not relate to any behavior defined in the Base-PP. |
FTP_TRP.1 | This SFR uses a subset of the protocols defined in the Base-PP for secure communications. This PP-Module extends the functionality by explicitly defining a communications path between a remote administrator and the TOE. |
This PP-Module does not define any Strictly Optional SFRs or SARs.
This PP-Module does not define any Objective SFRs.
This PP-Module does not define any Implementation-dependent SFRs.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_CKM_EXT Cryptographic Key Management FCS_KDF_EXT Cryptographic Key Derivation Function FCS_KYC_EXT Key Chaining and Key Storage FCS_SMC_EXT Submask Combining FCS_VAL_EXT Validation |
Identification and Authentication (FIA) | FIA_AUT_EXT Authorization FIA_CHR_EXT Challenge/Response Recovery Credential FIA_REC_EXT Recovery Support |
Protection of the TSF (FPT) | FPT_KYP_EXT Protection of Key and Key Material |
FCS_CKM_EXT.6, Cryptographic Password/Passphrase Conditioning, requires the TSF to implement password/passphrase conditioning using a specified algorithm and with specific constraints on the password/passphrase composition.
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG_EXT.1 Random Bit Generation |
FCS_KYC_EXT.1, Key Chaining and Key Storage, requires the TSF to specify how it implements key chaining.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_KDF_EXT.1 Cryptographic Key Derivation Function FCS_SMC_EXT.1 Submask Combining |
FCS_VAL_EXT.1, Validation, requires the TSF to specify what data is being validated and how the validation is performed.
FCS_VAL_EXT.2, Validation Remediation, requires the TSF to specify what the TOE’s response is in the event of a data validation failure.
There are no specific management functions identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_VAL_EXT.1 Validation |
FCS_KDF_EXT.1, Cryptographic Key Derivation Function, requires the TSF to specify how it performs key derivation.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG_EXT.1 Random Bit Generation |
FCS_SMC_EXT.1, Submask Combining, requires the TSF to implement submask combining in a specific manner to support the generation of intermediate keys.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
FIA_AUT_EXT.1, Subject Authorization, specifies the manner in which the TSF performs user authorization.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM_EXT.6 Cryptographic Password/Passphrase Conditioning FCS_RBG_EXT.1 Random Bit Generation |
FIA_REC_EXT.1, Recovery Support, requires the TSF to specify the supported recovery method and to include a means to enable/disable any supported recovery method.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_CHR_EXT.1, Challenge/Response Recovery Credential, requires the TSF to implement a challenge/response method to generate recovery credentials for an authorized user.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_VAL_EXT.1 Validation FIA_REC_EXT.1 Recovery Support |
FPT_KYP_EXT.1, Protection of Keys and Key Material , requires the TSF to protect stored key data in a specified manner.
FPT_KYP_EXT.2, Attribution of Key and Key Material, requires the TSF to protect stored key data in a specified manner.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_KDF_EXT.1 Cryptographic Key Derivation Function FCS_KYC_EXT.1 Key Chaining and Key Storage FCS_SMC_EXT.1 Submask Combining FCS_STO_EXT.1 Storage of Credentials |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FPT_ITT.1 Basic Internal TSF Data Transfer Protection |
Acronym | Meaning |
---|---|
AF | Authorization factor |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
EP | Extended Package |
FEK | File Encryption Key |
FP | Functional Package |
KEK | Key Encryption Key |
OE | Operational Environment |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RBG | Random Bit Generator |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
Identifier | Title |
---|---|
[AppPP] | Protection Profile for Application Software, Version 2.0, June 16, 2025 |
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[FIPS140-2] | Federal Information Processing Standard Publication (FIPS-PUB) 140-2, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, March 19, 2007 |
[FIPS180-4] | Federal Information Processing Standards Publication (FIPS-PUB) 180-4, Secure Hash Standard, March, 2012 |
[FIPS186-5] | Federal Information Processing Standard Publication (FIPS-PUB) 186-5, Digital Signature Standard (DSS), National Institute of Standards and Technology, February 2023 |
[FIPS197] | Federal Information Processing Standards Publication (FIPS-PUB) 197, Specification for the Advanced Encryption Standard (AES), November 26, 2001 |
[FIPS198-1] | Federal Information Processing Standards Publication (FIPS-PUB) 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008 |
[NIST800-132] | NIST Special Publication 800-132, Recommendation for Password-Based Key Derivation, December 2010 |
[NIST800-38A] | NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, 2001 Edition |
[NIST800-38F] | NIST Special Publication 800-38F,Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, December 2012 |
[NIST800-56A] | NIST Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), March 2007 |
[NIST800-56B] | NIST Special Publication 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography, August 2009 |
[NIST800-90] | NIST Special Publication 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised), March 2007 |