This page was not yet optimized for use on mobile
devices.
qCrypt-xStream R1.1
CSV information
| Status | archived |
|---|---|
| Valid from | 03.04.2015 |
| Valid until | 03.04.2020 |
| Scheme | 🇲🇾 MY |
| Manufacturer | QuintessenceLabs Pty Ltd. |
| Category | Key Management Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: ISCB-5-RPT-C059-CR-v1
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, TDES, HMACProtocols
SSH, TLSSecurity level
EAL2Security Functional Requirements (SFR)
FCS_RNG_EXTCertificates
ISCB-5-RPT-C059-CR-v1Standards
FIPS 140-2, FIPS 180-2, FIPS 186-4, FIPS 197, FIPS 198-1, NIST SP 800-67, NIST SP 800-90, NIST SP 800-133, PKCS #1, RFC 4346, RFC 5246File metadata
| Title | C059 Certification Report |
|---|---|
| Subject | qCrypt-xStream R1.1 |
| Keywords | qCrypt-xStream |
| Author | ISCB Department |
| Creation date | D:20150409024136+08'00' |
| Modification date | D:20150409024136+08'00' |
| Pages | 32 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Security target
Extracted keywords
Symmetric Algorithms
AES, TDES, Triple-DES, HMAC, HMAC-SHA-256Asymmetric Algorithms
RSA 2048, ECDSA, DSAHash functions
SHA-1, SHA-256Protocols
SSH, SSL, TLS, TLS v1.1, TLS v1.2Randomness
RNGLibraries
OpenSSLSecurity level
EAL2Claims
O.AUDREC, O.CRYPT, O.COMMSEC, O.CONTROL, O.PROTECT, O.TEST, T.AUDREC, T.COMMSEC, T.MALFUNC, T.UNAUTHORISED, T.TUSAGE, T.UNAUTHORISE, T.UNAUTHORISED_ACCESS, T.USAGE, A.ADMIN, A.CLIENT, A.UPDATE, OE.ADMIN, OE.CLIENT, OE.GUIDAN, OE.UPDATESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_RNG_EXT, FCS_RNG, FCS_RNG_EXT.1, FCS_RNG_EXT.1.1, FCS_RNG_EXT.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_IFF, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_UCT.1, FDP_UIT, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_ATD.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1.1, FTP_TRP.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionStandards
FIPS 140-2, FIPS 180-2, FIPS 186-4, FIPS 197, FIPS 198-1, NIST SP 800-67, NIST SP 800-90, NIST SP 800-133, SP 800-133, SP 800-67, SP 800-90B, PKCS #1, PKCS#1, RFC 4346, RFC 5246File metadata
| Title | qCrypt-xStream R1.1 |
|---|---|
| Subject | qCrypt-xStream |
| Author | Muzamir |
| Creation date | D:20150409024246+08'00' |
| Modification date | D:20150409024246+08'00' |
| Pages | 49 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C059-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Cert No | 2015-004-C059 | |
|---|---|---|
| Developer | QuintessenceLabs | |
| Level | EAL2 | |
| Product | qCrypt-xStream R1.1 | |
| Certification Date | 03.04.2015 | |
| Expiration Date | 03.04.2020 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/95 | |
| Enhanced | ||
| Developer | QuintessenceLabsUnit 1 Lower Ground15 Denison StDeakin, ACT 2600 URL:http://www.quintessencelabs.com/ | |
| Status | Archive | |
| Scope | The TOE is a cryptographic key management appliance, designed to centrally manage enterprise digital keys and certificates for enterprise applications, users and devices throughout their full life cycle, including key generation, distribution, usage, automated rotation and renewal in line with TOE-defined policy. The TOE primary features include: Secure generation, distribution and destruction of cryptographic keys; On-board cryptographic functions to secure traffic sent between the TOE and external users, Secure storage and management of keys throughout their lifecycle, Role-based authentication and access control mechanisms to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only; Functionality to detect errors in received traffic or replay attacks; Auditing of security relevant events to provide suitable accountability; Protection of stored audit data to prevent modification or accidental deletion; and Self-test of the core cryptographic functions and algorithms of the TOE. | |
| Cert Id | C059 | |
| Category | Key Management System | |
| Assurance Level | EAL2 | |
| Product | qCrypt-xStream R1.1 | |
| Certification Date | 03.04.2015 | |
| Expiration Date | 03.04.2020 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C059/0001363%20-%20qCrypt-xStream%20Security%20Target%20v1.0.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C059/ISCB-5-RPT-C059-CR-v1.pdf | |
| Type | Key Management Systems | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Key Management Systems",
"cert_link": null,
"dgst": "20b22ab545aa48f7",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C059-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2015-004-C059",
"certification_date": "2015-04-03",
"developer": "QuintessenceLabs",
"enhanced": {
"assurance_level": "EAL2",
"category": "Key Management System",
"cert_id": "C059",
"certification_date": "2015-04-03",
"developer": "QuintessenceLabsUnit 1 Lower Ground15 Denison StDeakin, ACT 2600 URL:http://www.quintessencelabs.com/",
"expiration_date": "2020-04-03",
"mutual_recognition": "CCRA",
"product": "qCrypt-xStream R1.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C059/ISCB-5-RPT-C059-CR-v1.pdf",
"scope": "The TOE is a cryptographic key management appliance, designed to centrally manage enterprise digital keys and certificates for enterprise applications, users and devices throughout their full life cycle, including key generation, distribution, usage, automated rotation and renewal in line with TOE-defined policy. The TOE primary features include: Secure generation, distribution and destruction of cryptographic keys; On-board cryptographic functions to secure traffic sent between the TOE and external users, Secure storage and management of keys throughout their lifecycle, Role-based authentication and access control mechanisms to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only; Functionality to detect errors in received traffic or replay attacks; Auditing of security relevant events to provide suitable accountability; Protection of stored audit data to prevent modification or accidental deletion; and Self-test of the core cryptographic functions and algorithms of the TOE.",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C059/0001363%20-%20qCrypt-xStream%20Security%20Target%20v1.0.pdf",
"type": "Key Management Systems"
},
"expiration_date": "2020-04-03",
"level": "EAL2",
"product": "qCrypt-xStream R1.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/95"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "QuintessenceLabs Pty Ltd.",
"manufacturer_web": "https://www.quintessencelabs.com/",
"name": "qCrypt-xStream R1.1",
"not_valid_after": "2020-04-03",
"not_valid_before": "2015-04-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C059-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C059-CR-v1": 30
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 10
}
},
"cc_sfr": {
"FCS": {
"FCS_RNG_EXT": 8
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-2": 1,
"FIPS 186-4": 1,
"FIPS 197": 1,
"FIPS 198-1": 1
},
"NIST": {
"NIST SP 800-133": 1,
"NIST SP 800-67": 1,
"NIST SP 800-90": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 4346": 1,
"RFC 5246": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"TDES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20150409024136+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "qCrypt-xStream",
"/ModDate": "D:20150409024136+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "qCrypt-xStream R1.1",
"/Title": "C059 Certification Report",
"pdf_file_size_bytes": 805207,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]",
"http://www.cybersecurity.my/mycc",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"st_filename": "0001363 - qCrypt-xStream Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA 2048": 4
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.CLIENT": 3,
"A.UPDATE": 3
},
"O": {
"O.AUDREC": 4,
"O.COMMSEC": 4,
"O.CONTROL": 4,
"O.CRYPT": 4,
"O.PROTECT": 3,
"O.TEST": 4
},
"OE": {
"OE.ADMIN": 4,
"OE.CLIENT": 2,
"OE.GUIDAN": 2,
"OE.UPDATE": 2
},
"T": {
"T.AUDREC": 3,
"T.COMMSEC": 2,
"T.MALFUNC": 2,
"T.TUSAGE": 2,
"T.UNAUTHORISE": 1,
"T.UNAUTHORISED": 3,
"T.UNAUTHORISED_ACCESS": 1,
"T.USAGE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 3,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 4,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 5,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 8,
"FCS_COP.1.1": 1,
"FCS_RNG": 2,
"FCS_RNG_EXT": 3,
"FCS_RNG_EXT.1": 9,
"FCS_RNG_EXT.1.1": 1,
"FCS_RNG_EXT.1.2": 1
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_ETC.1": 5,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC.1": 8,
"FDP_IFF": 2,
"FDP_ITC.1": 11,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 6,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1,
"FDP_UCT.1": 5,
"FDP_UCT.1.1": 1,
"FDP_UIT": 2,
"FDP_UIT.1": 3,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 6,
"FMT_MTD.1.1": 1,
"FMT_REV.1": 5,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 2,
"FPT_ITC.1": 5,
"FPT_ITC.1.1": 1,
"FPT_ITI.1": 5,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_RPL.1": 5,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 3,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 3,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 6
}
},
"crypto_protocol": {
"SSH": {
"SSH": 15
},
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 30,
"TLS v1.1": 2,
"TLS v1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 10
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 180-2": 3,
"FIPS 186-4": 5,
"FIPS 197": 3,
"FIPS 198-1": 3
},
"NIST": {
"NIST SP 800-133": 1,
"NIST SP 800-67": 1,
"NIST SP 800-90": 1,
"SP 800-133": 4,
"SP 800-67": 2,
"SP 800-90B": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 4
},
"RFC": {
"RFC 4346": 2,
"RFC 5246": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 3,
"Triple-DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 1,
"HMAC-SHA-256": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Muzamir",
"/CreationDate": "D:20150409024246+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20150409024246+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "qCrypt-xStream",
"/Title": "qCrypt-xStream R1.1",
"pdf_file_size_bytes": 1012491,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 49
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C059-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0001363%20-%20qCrypt-xStream%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0226cbc56b433e4a617c2f54dd23e0ee0b230f232ede026e8cb3c399aad3e402",
"txt_hash": "5d7f63f9483a91739d10a5be139d349f9c8aceb6b3af4a84b1234ce47b3e1d98"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "ffd8dcc3d08127b93b84269c9c1b7a4c019223ddaefc275ba40de533b6a91599",
"txt_hash": "8d2fee8bfeb8a6ebdf245b1beaad501e5934ee8d04ffbecbcd7b2a7fa68863cd"
}
},
"status": "archived"
}