Developers: | NPO Eshelon JSC |
Last Release Date: | January, 2013 |
Technology: | Cybersecurity - Means of enciphering |
Content |
Appointment
Carrying out inspection control, recertification, control of integrity and change tracking of versions of software products.
Advantages
- calculation of checksums of folders and files on all widespread algorithms;
- creation of the report of control summing in files of the .html, .txt and .csv formats;
- providing opportunities for determination of number of files with identical names and checksums of files;
- carrying out inspection control of the software;
- creation of reports on results of comparison of source texts of the software for the purpose of detection of the modified, added and remote files of source texts of programs.
lite PEAK:
- calculation of checksums of folders and files on all widespread algorithms;
- creation of the report of control summing in files of the .html, .txt and .csv formats;
2017: Inspection control in the system of certification of the Russian Defense Ministry
Means of carrying out inspection control, recertification, control of integrity and change tracking of versions of the software products "PEAK Echelon" successfully underwent inspection control in the system of certification of the Russian Defense Ministry.
Certificates of the Russian Defense Ministry No. 3752, 3753 and 3754 "the Echelon" affect with PIK means of carrying out inspection control till October 26, 2022.
These certificates certify that "PIK the Echelon" conforms to requirements of the order of the Minister of Defence of the Russian Federation of 1996 No. 058:
- on the 2nd level of absence control of not declared opportunities according to the regulating document "Protection against unauthorized access to information. Part 1. Information security software. Classification by the level of absence control of not declared opportunities" (State Technical Commission of Russia, 1999);
- on compliance of the real and declared in documentation functionality.
Within inspection control "PIK the Echelon" was added support of Elbrus OS on architecture of e2k, spark and intel and a possibility of carrying out inspection control on the existing reports of control summing. Also new version "PEAK Echelon" is distinguished by the improved interface and the mode of compatibility with earlier versions.
2016: Certification of the Russian Defense Ministry
Russian Defense Ministry No. 994, confirming fulfillment of requirements of the Order MO Russian Federation, including: to requirements of the regulating document "Protection against unauthorized access to information. Part 1. Information security software. Classification by the level of absence control of not declared opportunities", (State Technical Commission of Russia, 1999) – on the 2nd level of control; to requirements for compliance of the real and declared in documentation functionality.
The software "The program of the inspection control "PIK-Eshelon" is included in the unified register of the Russian programs for electronic computers and databases (the register of the Russian software). Order of the Ministry of Telecom and Mass Communications of the Russian Federation of 9/22/2016.
2013
Since January 1, 2013 Rosstandart enacted the standard a hash functions of GOST P 34.11-2012 (the project name "Stribog") instead of outdated GOST P 34.11-94. The algorithm differs not only the increased cryptofirmness, but also a possibility of more effective implementation thanks to only additions on module 2 and instructions of transfer of data.
The Eshelon company included support of an algorithm in the software product "PEAK Echelon". Initially "Eshelon" was developed by PIK for use in testing laboratories for carrying out inspection control, control of integrity and change tracking of versions of software products. Now the complex is used also by archives of the enterprises for the centralized control of integrity of the stored electronic documents. The product successfully went certification to the Russian Defense Ministry (certificate No. 994).
"PIK the Echelon" maintains the wide list of algorithms: GOST 34.11-2012, GOST 34.11-94, FIKS (Level 1), FIKS (Level 3), FIX (VIDEOCONFERENCING), MD5, CRC 8/16/32, SHA-1/224/256/384/512. In the new version of a product the user interface is seriously processed and improved and also a set of the preset filters is added and thin setup of algorithms is available.