YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure
CSV information ?
Status | active |
---|---|
Valid from | 17.02.2022 |
Valid until | 17.02.2027 |
Scheme | 🇲🇾 MY |
Manufacturer | You Tech Solutions Sdn Bhd |
Category | Data Protection |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Title | SISCB Print22030313210 |
---|---|
Creation date | D:20220303132121+08'00' |
Modification date | D:20220303132121+08'00' |
Pages | 1 |
Creator | ISCB Printer |
Producer | KONICA MINOLTA bizhub C360i |
Certification report ?
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-2Vendor
MicrosoftSecurity level
EAL2, EAL 2Claims
A.USER, A.IDLECertificates
ISCB-3-RPT-C123-CR-v1Side-channel analysis
Reverse EngineeringStandards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | ISCB-3-RPT-C123-CR-v1 |
---|---|
Creation date | D:20220226075203Z00'00' |
Modification date | D:20220226075203Z00'00' |
Pages | 32 |
Creator | Word |
Producer | macOS Version 11.6 (Build 20G165) Quartz PDFContext |
Security target ?
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-2Block cipher modes
CBCVendor
MicrosoftSecurity level
EAL 2, EAL2Claims
O.DATA, O.AUDIT, T.AUDIT, T.SESSIONHIJACK, T.DATA, A.USER, A.IDLE, OE.USER, OE.IDLESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_UAU.1, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FMT_MSA.3, FPT_STM.1Certification process
out of scope, Yes - FCS_CKM.1 FCS_COP.1 FCS_CKM.4 Partial, FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FCS_COP.1 FCS_CKM.1 FCS_CKM.4, FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FAU_GEN.1 FPT_STM.1 No FPT_STMStandards
FIPS PUB 197File metadata
Title | YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target |
---|---|
Subject | YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target |
Author | wlim |
Creation date | D:20211127064514+08'00' |
Modification date | D:20211127064514+08'00' |
Pages | 27 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data ?
Cert No | 2022-001-C123 | |
---|---|---|
Developer | You Tech Solutions Sdn Bhd | |
Level | EAL2 | |
Product | YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure | |
Certification Date | 17.02.2022 | |
Expiration Date | 17.02.2027 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/73 | |
Enhanced | ||
Cert Id | C123 | |
Product | YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure | |
Developer | You Tech Solutions Sdn Bhd51-1, Lorong Perda Utama 3, Taman Prominence, 14000 Bukit Mertajam, Penang.Tel: +604 297 4507Website:https://www.youtech.com.my | |
Category | Data Protection | |
Type | Data Protection | |
Scope | The TOE consists of the following components: YOUTECHSKIT – YOUTECH256SKI Token (Hardware); and YOUTECHSKICS – YOUTECH256SKI Cipher System (Software) The TOE is delivered as an appliance by the developer and to be configured according to the Preparative Guidance. YOUTECH256SKIT is the key for user to encrypt or decrypt the files that user would like to protect. Two factors authentication will be prompted to user when user connect the YOUTECH256SKIT to their computer/laptop. YOUTECH256SKICS will perform two factors authentication verification by comparing the username, password and unique identifier which embedded in microchip of YOUTECH256SKIT with YOUTECH256SKI PostgreSQL Database. Once successfully authenticated, the YOUTECH256SKICS will decrypt the files in the protected folder. | |
Assurance Level | EAL2 | |
Certification Date | 17.02.2022 | |
Expiration Date | 17.02.2027 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C123/YOUTECH256SKI_Security_Target-1.0.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C123/ISCB-3-RPT-C123-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2022-02-17', 'expiration_date': '2027-02-17', 'enhanced': {'__update__': {'scope': 'The TOE consists of the following components: YOUTECHSKIT – YOUTECH256SKI Token (Hardware); and YOUTECHSKICS – YOUTECH256SKI Cipher System (Software) The TOE is delivered as an appliance by the developer and to be configured according to the Preparative Guidance. YOUTECH256SKIT is the key for user to encrypt or decrypt the files that user would like to protect. Two factors authentication will be prompted to user when user connect the YOUTECH256SKIT to their computer/laptop. YOUTECH256SKICS will perform two factors authentication verification by comparing the username, password and unique identifier which embedded in microchip of YOUTECH256SKIT with YOUTECH256SKI PostgreSQL Database. Once successfully authenticated, the YOUTECH256SKICS will decrypt the files in the protected folder.', 'certification_date': '2022-02-17', 'expiration_date': '2027-02-17'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0e2529bf85514de238af4f4642e561496e0f5a131adfc050f460459a5055bf97', 'txt_hash': '6e5db49ded2657b1506028136139493196d048384abb95ab98aeecb31c03d41b'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c708fd1347d38719077ede9a5fe3d26964958a998ff9b8a5d98b417957e5e65e', 'txt_hash': '3d4a6d06bb3d3dde57106b2464a9161dbd91b6c4259eda8d109eadffae126bca'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 637188, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 27, '/Title': 'YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target', '/Author': 'wlim', '/Subject': 'YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20211127064514+08'00'", '/ModDate': "D:20211127064514+08'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 93221, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'SISCB Print22030313210', '/Creator': 'ISCB Printer', '/Producer': 'KONICA MINOLTA bizhub C360i', '/CreationDate': "D:20220303132121+08'00'", '/ModDate': "D:20220303132121+08'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_STG.1': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_COP.1': 6, 'FCS_CKM.1': 6, 'FCS_CKM.2': 1, 'FCS_CKM.4': 8, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 6, 'FDP_ACF.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UAU.5': 4, 'FIA_UID.2': 7, 'FIA_UAU.1': 1, 'FIA_UID.1': 4, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 4}, 'FPT': {'FPT_STM.1': 3}}, 'cc_claims': {'O': {'O.DATA': 4, 'O.AUDIT': 4}, 'T': {'T.AUDIT': 2, 'T.SESSIONHIJACK': 3, 'T.DATA': 2}, 'A': {'A.USER': 3, 'A.IDLE': 2}, 'OE': {'OE.USER': 4, 'OE.IDLE': 4}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 6}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, 'Yes - FCS_CKM.1 FCS_COP.1 FCS_CKM.4 Partial, FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FCS_COP.1 FCS_CKM.1 FCS_CKM.4': 1, 'FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FAU_GEN.1 FPT_STM.1 No FPT_STM': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
YOUTECH256SKI Security Target-1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C123-CERTIFICATE-v1.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C123-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YOUTECH256SKI%20Security%20Target-1.0.pdf
.
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Data Protection",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C123-CERTIFICATE-v1.pdf",
"dgst": "f43b594a6bd62ea6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C123-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.78",
"2.5"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2022-001-C123",
"certification_date": "2022-02-17",
"developer": "You Tech Solutions Sdn Bhd",
"enhanced": {
"assurance_level": "EAL2",
"category": "Data Protection",
"cert_id": "C123",
"certification_date": "2022-02-17",
"developer": "You Tech Solutions Sdn Bhd51-1, Lorong Perda Utama 3, Taman Prominence, 14000 Bukit Mertajam, Penang.Tel: +604 297 4507Website:https://www.youtech.com.my",
"expiration_date": "2027-02-17",
"mutual_recognition": "CCRA",
"product": "YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C123/ISCB-3-RPT-C123-CR-v1.pdf",
"scope": "The TOE consists of the following components: YOUTECHSKIT \u2013 YOUTECH256SKI Token (Hardware); and YOUTECHSKICS \u2013 YOUTECH256SKI Cipher System (Software) The TOE is delivered as an appliance by the developer and to be configured according to the Preparative Guidance. YOUTECH256SKIT is the key for user to encrypt or decrypt the files that user would like to protect. Two factors authentication will be prompted to user when user connect the YOUTECH256SKIT to their computer/laptop. YOUTECH256SKICS will perform two factors authentication verification by comparing the username, password and unique identifier which embedded in microchip of YOUTECH256SKIT with YOUTECH256SKI PostgreSQL Database. Once successfully authenticated, the YOUTECH256SKICS will decrypt the files in the protected folder.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C123/YOUTECH256SKI_Security_Target-1.0.pdf",
"type": "Data Protection"
},
"expiration_date": "2027-02-17",
"level": "EAL2",
"product": "YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/73"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "You Tech Solutions Sdn Bhd",
"manufacturer_web": "https://www.youtech.com.my",
"name": "YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure",
"not_valid_after": "2027-02-17",
"not_valid_before": "2022-02-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C123-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20220303132121+08\u002700\u0027",
"/Creator": "ISCB Printer",
"/ModDate": "D:20220303132121+08\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C360i",
"/Title": "SISCB Print22030313210",
"pdf_file_size_bytes": 93221,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-3-RPT-C123-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C123-CR-v1": 31
}
},
"cc_claims": {
"A": {
"A.IDLE": 1,
"A.USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"Reverse Engineering": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20220226075203Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20220226075203Z00\u002700\u0027",
"/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
"/Title": "ISCB-3-RPT-C123-CR-v1",
"pdf_file_size_bytes": 1101004,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"st_filename": "YOUTECH256SKI Security Target-1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.IDLE": 2,
"A.USER": 3
},
"O": {
"O.AUDIT": 4,
"O.DATA": 4
},
"OE": {
"OE.IDLE": 4,
"OE.USER": 4
},
"T": {
"T.AUDIT": 2,
"T.DATA": 2,
"T.SESSIONHIJACK": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_STG.1": 4,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM.1": 6,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 8,
"FCS_COP.1": 6,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 6,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1
},
"FIA": {
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.3": 4
},
"FPT": {
"FPT_STM.1": 3
}
},
"certification_process": {
"OutOfScope": {
"FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FAU_GEN.1 FPT_STM.1 No FPT_STM": 1,
"Yes - FCS_CKM.1 FCS_COP.1 FCS_CKM.4 Partial, FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FCS_COP.1 FCS_CKM.1 FCS_CKM.4": 1,
"out of scope": 4
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "wlim",
"/CreationDate": "D:20211127064514+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20211127064514+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target",
"/Title": "YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target",
"pdf_file_size_bytes": 637188,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C123-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YOUTECH256SKI%20Security%20Target-1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c708fd1347d38719077ede9a5fe3d26964958a998ff9b8a5d98b417957e5e65e",
"txt_hash": "3d4a6d06bb3d3dde57106b2464a9161dbd91b6c4259eda8d109eadffae126bca"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2dab82e32fade88956b1463a534ded9e74befd79918ff1c2054e6fa71eab13e1",
"txt_hash": "aaa208f54a1cbd5e2da06b51e05be3285e7093a97cf6e563f6a89d96df3d8996"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0e2529bf85514de238af4f4642e561496e0f5a131adfc050f460459a5055bf97",
"txt_hash": "6e5db49ded2657b1506028136139493196d048384abb95ab98aeecb31c03d41b"
}
},
"status": "active"
}