PKID ECC Generator v1.1

CSV information ?

Status archived
Valid from 20.11.2013
Valid until 20.11.2018
Scheme 🇲🇾 MY
Manufacturer WannaStation.com (M) Sdn Bhd
Category Key Management Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C049-CR-v1a

Certificate ?

Certification report ?

Extracted keywords

Asymmetric Algorithms
ECC
Schemes
MAC
Randomness
PRNG

Security level
EAL2
Certificates
ISCB-5-RPT-C049-CR-v1a

Side-channel analysis
Reverse engineering

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title C049 Certification Report
Subject PKID ECC Generator v1.1
Keywords PKID ECC Generator
Author ISCB Department
Creation date D:20131127174041+08'00'
Modification date D:20131127174047+08'00'
Pages 29
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Security target ?

Extracted keywords

Asymmetric Algorithms
ECC
Schemes
MAC

Security level
EAL2
Claims
O.CUSTOMIZE, O.UNIQUE, O.AUTH, O.FUNCTION, T.DUPLICATE, T.KEYS, A.PHY, A.ADMIN, A.INPUT, A.DESTRUCT, A.CLIENT, A.REVOKE, A.SECURE, OE.PHY, OE.ADMIN, OE.INPUT, OE.DESTRUCT, OE.CLIENT, OE.REVOKE, OE.SECURE, OSP.ROLE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.2.1, FIA_SOS.1.1, FMT_SMF.1, FMT_SMF.1.1

File metadata

Author WannaStation (M) Sdn Bhd
Creation date D:20131030112613+08'00'
Modification date D:20131030112613+08'00'
Pages 33
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: ISCB-5-RPT-C049-CR-v1a

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data ?

Cert No 2013-009-C049
Developer WannaStation.com (M) Sdn Bhd
Level EAL2
Product PKID ECC Generator v1.1
Certification Date 20.11.2013
Expiration Date 20.11.2018
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/96
Enhanced
Developer Gan Chin Sam WannaStation.com (M) Sdn BhdLot 1109-A, 10th Floor Kelana Parkview Tower,No 1, Jalan SS6/2, Kelana Jaya,47301 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.wannastation.com/Email: [email protected]: +603 7885 0977Fax: +603 7885 0979
Status Archive
Scope The Target of Evaluation (TOE) is PKID ECC Generator v1.1, software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID. A user may choose a PKID unique to himself or herself, such as PC/Notebook MAC address, IMEI number and email address. A chosen PKID will become the seed to generate a public and private key through a series of key generation processes. The generated public and private keys are tied to the chosen PKID. Using algorithm based on elliptic curve encryption algorithm, much smaller key size will be used and desirable as it allows the application on PC, smart phones or mobile communication devices for multi-function security applications. The evaluation scope only covers: the generation of the Master Key based on random keystroke input from client organisation. The Master Key will be used to generate the customised PKID ECC Generator specific to that client organisation, and the generation of public and private keys together with the access code, based on the user’s PKID entered manually to the generated customised PKID ECC Generator.Hardware, software like automation Detection Software and operating system, and revocation, destruction and recovery of keys are not covered in the TOE scope. The scope of evaluation covers major security features as follows: Authentication – in order to generate the customised PKID ECC Generator which is specific to the client organisation, authentication is required by the TOE administrator before the Master Key can be imported into the generator. Authentication is also required by the TOE administrator to access the customised PKID ECC Generator before any further action is permitted. Security Management – provides management of TOE security functions during customisation of the PKID ECC generator such as setting the access code for the generated Master Key, management of public and private keys, and management of administrator credential in the customised PKID ECC generator. Cryptographic Support – provides generation of Master Key during customisation of the PKID ECC Generator based on the random keystroke input from client organisation, and generation of public and private keys together with access code, in customised PKID ECC Generator using specified encryption algorithm.
Cert Id C049
Category Key Management System
Assurance Level EAL2
Product PKID ECC Generator v1.1
Certification Date 20.11.2013
Expiration Date 20.11.2018
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/PKIDECC-ST-v1.0-071013.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/ISCB-5-RPT-C049-CR-v1a.pdf
Type Software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID.

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL2'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2013-11-20', 'expiration_date': '2018-11-20', 'enhanced': {'__update__': {'developer': 'Gan Chin Sam WannaStation.com (M) Sdn BhdLot 1109-A, 10th Floor Kelana Parkview Tower,No 1, Jalan SS6/2, Kelana Jaya,47301 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.wannastation.com/Email: [email protected]: +603 7885 0977Fax: +603 7885 0979', 'scope': 'The Target of Evaluation (TOE) is PKID ECC Generator v1.1, software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID. A user may choose a PKID unique to himself or herself, such as PC/Notebook MAC address, IMEI number and email address. A chosen PKID will become the seed to generate a public and private key through a series of key generation processes. The generated public and private keys are tied to the chosen PKID. Using algorithm based on elliptic curve encryption algorithm, much smaller key size will be used and desirable as it allows the application on PC, smart phones or mobile communication devices for multi-function security applications. The evaluation scope only covers: the generation of the Master Key based on random keystroke input from client organisation. The Master Key will be used to generate the customised PKID ECC Generator specific to that client organisation, and the generation of public and private keys together with the access code, based on the user’s PKID entered manually to the generated customised PKID ECC Generator.Hardware, software like automation Detection Software and operating system, and revocation, destruction and recovery of keys are not covered in the TOE scope. The scope of evaluation covers major security features as follows: Authentication – in order to generate the customised PKID ECC Generator which is specific to the client organisation, authentication is required by the TOE administrator before the Master Key can be imported into the generator. Authentication is also required by the TOE administrator to access the customised PKID ECC Generator before any further action is permitted. Security Management – provides management of TOE security functions during customisation of the PKID ECC generator such as setting the access code for the generated Master Key, management of public and private keys, and management of administrator credential in the customised PKID ECC generator. Cryptographic Support – provides generation of Master Key during customisation of the PKID ECC Generator based on the random keystroke input from client organisation, and generation of public and private keys together with access code, in customised PKID ECC Generator using specified encryption algorithm.', 'certification_date': '2013-11-20', 'expiration_date': '2018-11-20'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e60edcc102ed7a2db4593d65780ed45ce2fc5f7232997187943d28956c084532', 'txt_hash': 'd5f53c76e5d2d98d91c196bc62eee6ffdd5a42877dd42b0be091b51ab1a79c61'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '659a730c32ccb088cc154103f4b40ae048ace931754960a76b249bf8a2e23cf6', 'txt_hash': '506b44abb0f65e163b7f471f0718bd2a91d7b7f2cd0eef9ab21fb5204749a5e1'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 507839, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 29, '/Author': 'ISCB Department', '/Category': 'PUBLIC', '/Caveat': 'FINAL', '/Classification': 'PUBLIC', '/Company': 'CyberSecurity Malaysia', '/CreationDate': "D:20131127174041+08'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Developer': 'Wannastation.com (M) Sdn Bhd', '/Document Type': 'CR', '/Identifier': 'ISCB-5-RPT-C049-CR-v1a', '/Index': 'MyCB_TMP_002', '/Keywords': 'PKID ECC Generator', '/ModDate': "D:20131127174047+08'00'", '/Phase': 'Release', '/Producer': 'Adobe PDF Library 10.0', '/Project Code': 'C049', '/Released': '20 November 2013', '/ST Date': '7 October 2013', '/ST Title': 'PKID ECC Generator v1.1 Security Target', '/ST Version': 'v1.0', '/SourceModified': 'D:20131127094025', '/Sponsor': 'Wannastation.com (M) Sdn Bhd', '/Subject': 'PKID ECC Generator v1.1', '/TOE Name': 'PKID ECC Generator', '/TOE Version': 'v1.1', '/Title': 'C049 Certification Report', '/Version': 'v1a', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.cybersecurity.my/mycc', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1048687, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/Author': 'WannaStation (M) Sdn Bhd', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20131030112613+08'00'", '/ModDate': "D:20131030112613+08'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C049-CR-v1a': 29}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 11}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 83}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 8}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'Reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 21, 'FCS_CKM.2': 20, 'FCS_COP.1': 4, 'FCS_CKM.4': 16, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 2}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4}, 'FIA': {'FIA_UAU.2': 14, 'FIA_SOS.1': 7, 'FIA_UAU.1': 2, 'FIA_UID.1': 5, 'FIA_UAU.2.1': 2, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_SMF.1': 13, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.CUSTOMIZE': 5, 'O.UNIQUE': 4, 'O.AUTH': 6, 'O.FUNCTION': 4}, 'T': {'T.DUPLICATE': 3, 'T.KEYS': 2}, 'A': {'A.PHY': 3, 'A.ADMIN': 2, 'A.INPUT': 3, 'A.DESTRUCT': 2, 'A.CLIENT': 3, 'A.REVOKE': 2, 'A.SECURE': 3}, 'OE': {'OE.PHY': 3, 'OE.ADMIN': 3, 'OE.INPUT': 3, 'OE.DESTRUCT': 3, 'OE.CLIENT': 3, 'OE.REVOKE': 3, 'OE.SECURE': 3}, 'OSP': {'OSP.ROLE': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 59}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C049-CR-v1a.pdf.
    • The st_filename property was set to PKIDECC-ST-v1.0-071013.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C049-CR-v1a.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C049-CR-v1a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PKIDECC-ST-v1.0-071013.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name PKID ECC Generator v1.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": null,
  "dgst": "ab7d3eefa9027743",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C049-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2013-009-C049",
      "certification_date": "2013-11-20",
      "developer": "WannaStation.com (M) Sdn Bhd",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Key Management System",
        "cert_id": "C049",
        "certification_date": "2013-11-20",
        "developer": "Gan Chin Sam WannaStation.com (M) Sdn BhdLot 1109-A, 10th Floor Kelana Parkview Tower,No 1, Jalan SS6/2, Kelana Jaya,47301 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.wannastation.com/Email: [email protected]: +603 7885 0977Fax: +603 7885 0979",
        "expiration_date": "2018-11-20",
        "mutual_recognition": "CCRA",
        "product": "PKID ECC Generator v1.1",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/ISCB-5-RPT-C049-CR-v1a.pdf",
        "scope": "The Target of Evaluation (TOE) is PKID ECC Generator v1.1, software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID. A user may choose a PKID unique to himself or herself, such as PC/Notebook MAC address, IMEI number and email address. A chosen PKID will become the seed to generate a public and private key through a series of key generation processes. The generated public and private keys are tied to the chosen PKID. Using algorithm based on elliptic curve encryption algorithm, much smaller key size will be used and desirable as it allows the application on PC, smart phones or mobile communication devices for multi-function security applications. The evaluation scope only covers: the generation of the Master Key based on random keystroke input from client organisation. The Master Key will be used to generate the customised PKID ECC Generator specific to that client organisation, and the generation of public and private keys together with the access code, based on the user\u2019s PKID entered manually to the generated customised PKID ECC Generator.Hardware, software like automation Detection Software and operating system, and revocation, destruction and recovery of keys are not covered in the TOE scope. The scope of evaluation covers major security features as follows: Authentication \u2013 in order to generate the customised PKID ECC Generator which is specific to the client organisation, authentication is required by the TOE administrator before the Master Key can be imported into the generator. Authentication is also required by the TOE administrator to access the customised PKID ECC Generator before any further action is permitted. Security Management \u2013 provides management of TOE security functions during customisation of the PKID ECC generator such as setting the access code for the generated Master Key, management of public and private keys, and management of administrator credential in the customised PKID ECC generator. Cryptographic Support \u2013 provides generation of Master Key during customisation of the PKID ECC Generator based on the random keystroke input from client organisation, and generation of public and private keys together with access code, in customised PKID ECC Generator using specified encryption algorithm.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/PKIDECC-ST-v1.0-071013.pdf",
        "type": "Software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID."
      },
      "expiration_date": "2018-11-20",
      "level": "EAL2",
      "product": "PKID ECC Generator v1.1",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/96"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "WannaStation.com (M) Sdn Bhd",
  "manufacturer_web": "https://www.wannastation.com/",
  "name": "PKID ECC Generator v1.1",
  "not_valid_after": "2018-11-20",
  "not_valid_before": "2013-11-20",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C049-CR-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 83
          }
        }
      },
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C049-CR-v1a": 29
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 11
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "Reverse engineering": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/Category": "PUBLIC",
      "/Caveat": "FINAL",
      "/Classification": "PUBLIC",
      "/Company": "CyberSecurity Malaysia",
      "/CreationDate": "D:20131127174041+08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Developer": "Wannastation.com (M) Sdn Bhd",
      "/Document Type": "CR",
      "/Identifier": "ISCB-5-RPT-C049-CR-v1a",
      "/Index": "MyCB_TMP_002",
      "/Keywords": "PKID ECC Generator",
      "/ModDate": "D:20131127174047+08\u002700\u0027",
      "/Phase": "Release",
      "/Producer": "Adobe PDF Library 10.0",
      "/Project Code": "C049",
      "/Released": "20 November 2013",
      "/ST Date": "7 October 2013",
      "/ST Title": "PKID ECC Generator v1.1 Security Target",
      "/ST Version": "v1.0",
      "/SourceModified": "D:20131127094025",
      "/Sponsor": "Wannastation.com (M) Sdn Bhd",
      "/Subject": "PKID ECC Generator v1.1",
      "/TOE Name": "PKID ECC Generator",
      "/TOE Version": "v1.1",
      "/Title": "C049 Certification Report",
      "/Version": "v1a",
      "pdf_file_size_bytes": 507839,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.cybersecurity.my/mycc",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 29
    },
    "st_filename": "PKIDECC-ST-v1.0-071013.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 59
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.CLIENT": 3,
          "A.DESTRUCT": 2,
          "A.INPUT": 3,
          "A.PHY": 3,
          "A.REVOKE": 2,
          "A.SECURE": 3
        },
        "O": {
          "O.AUTH": 6,
          "O.CUSTOMIZE": 5,
          "O.FUNCTION": 4,
          "O.UNIQUE": 4
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.CLIENT": 3,
          "OE.DESTRUCT": 3,
          "OE.INPUT": 3,
          "OE.PHY": 3,
          "OE.REVOKE": 3,
          "OE.SECURE": 3
        },
        "OSP": {
          "OSP.ROLE": 3
        },
        "T": {
          "T.DUPLICATE": 3,
          "T.KEYS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 21,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 20,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 16,
          "FCS_COP.1": 4
        },
        "FDP": {
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 14,
          "FIA_UAU.2.1": 2,
          "FIA_UID.1": 5
        },
        "FMT": {
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "WannaStation (M) Sdn Bhd",
      "/CreationDate": "D:20131030112613+08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20131030112613+08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 1048687,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C049-CR-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PKIDECC-ST-v1.0-071013.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e60edcc102ed7a2db4593d65780ed45ce2fc5f7232997187943d28956c084532",
      "txt_hash": "d5f53c76e5d2d98d91c196bc62eee6ffdd5a42877dd42b0be091b51ab1a79c61"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "659a730c32ccb088cc154103f4b40ae048ace931754960a76b249bf8a2e23cf6",
      "txt_hash": "506b44abb0f65e163b7f471f0718bd2a91d7b7f2cd0eef9ab21fb5204749a5e1"
    }
  },
  "status": "archived"
}