English version. Guidelines for the implementation of Secure Signature-Creation Devices

Size: px
Start display at page:

Download "English version. Guidelines for the implementation of Secure Signature-Creation Devices"

Transcription

1 CEN WORKSHOP CWA March 2004 AGREEMENT ICS ; ; Supersedes CWA 14355:2002 English version Guidelines for the implementation of Secure Signature-Creation Devices This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the constitution of which is indicated in the foreword of this Workshop Agreement. The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the National Members of CEN but neither the National Members of CEN nor the CEN Management Centre can be held accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation. This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members. This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies. CEN members are the national standards bodies of Austria, Belgium, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG Management Centre: rue de Stassart, 36 B-1050 Brussels 2004 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No.:CWA 14355:2004 E

2 Contents Contents...2 Foreword Scope References Normative references Informative references Terms and definitions, abbreviations Terms and definitions Abbreviations Document conventions SSCD-related provisions of the Directive Relevant definitions General provisions given as recitals Technical aspects of provisions given in Annex III SSCD-related provisions on qualified certificates and CSP Explanatory amendments to CWA General implementation guidelines SSCD overview SSCD Types SSCD Type SSCD Type SSCD Type TOE vs. TOE IT-environment SSCD Type 1 and SSCD Type All SSCD Types Guidelines on specific matters of interest Inter-TSF trusted channel (FTP_ITC) and trusted path (FTP_TRP) Reasoning for selection Implementation examples TOE Emanation (FPT_EMSEC) Reasoning for selection Logical attacks Leakage through radiation Leakage during cryptographic operations, power attacks Insertion of faults, fault analysis Security function policies and roles (FDP_ACC, FDP_ACF) SSCD Type SSCD Type SSCD Type Transition to operational state Key destruction (FCS_CKM.4) Authentication failure handling (FIA_AFL) Requests for clarification Status of the SSCD PPs Key generation at the CSP Usage for CSP signing Key recovery, key escrow, shared secrets for SSCDs Signature service provision SVD export/import for Type Cryptographic attacks Authentication and identification Reasonably assured...30 page 2

3 Management of security function behaviour (FMT_MOF.1) Emanation Security (FPT_EMSEC) vs. Unobservability (FPR_UNO) Relation of SSCD PP to other standards Overview of related protection profiles SSCD PP Eurosmart PP9911 (software and hardware) relying on PP9806 (hardware) Eurosmart PP0002 "Smart Card IC Platform Protection Profile" Eurosmart PP0010 "Smart Card IC with Multi-Application Secure Platform" The NIST SC-user group PP-document (Version 3.0) Evaluation aspects of SSCD as HW-SW combination Requirements for hardware components Division of SSCD into different components Hardware platform Operating system SSCD application Evaluation of the SSCD as composite device Case 1 Evaluation of the SSCD as an integral product Case 2 - Evaluation of the SSCD using hardware evaluation results Case 3 - Evaluation of the SSCD using results of hardware and operating system evaluation General Platform Implementation Guidelines SSCD and the Qualified Certificate SSCD-indicator in the certificate Trusted channel to the CGA Certificate distribution Implementation of SCA and SSCD Class 1 SCS SCA and SSCD share a computing engine Class 2 SCS SCA and SSCD on separate computing engines Display limitations Display message (DM) device Display hash (DH) device Use cases Class 1DM System Class 2DM System Class 1DH System Class 2DH System Implementation guidelines for smartcards SSCD platform functions Personalisation User authentication Trusted channels and trusted path SSCD environment Implementation guidelines for mobile phones Usage considerations Displaying the complete message on the phone Displaying only a hash value on the phone SSCD platform functions Personalisation User authentication Trusted channels and trusted path SSCD environment Implementation guidelines for PDA Computing engine choices Single Computing engine Separate Computing engines Display considerations Display Message device Display Hash device User intentions

4 10.4 SSCD platform functions Personalisation User Authentication Trusted Paths and Channels Implementation guidelines for PCs Computing engine choices Single Computing engine Separate Computing engines Display considerations Display Message device Display Hash device User intentions SSCD platform functions Personalisation User Authentication Trusted Paths and Channels Signing Services...55 Annex I (informative) Comparison of Protection Profiles...56 AI.1 Security Objectives comparison...56 AI.1.1 SSCD vs. Eurosmart PP AI Scope of TOE...57 AI Comparison of security objectives...57 AI.1.2 SSCD vs. Eurosmart PP AI Scope of TOE...58 AI Comparison of security objectives...59 AI.1.3 SSCD vs. SCSUG...59 AI Scope of TOE...59 AI Comparison of security objectives...59 AI.2 Functional Security Requirements comparison...61 AI.2.1 FAU Security audit...61 AI.2.2 FCS Cryptographic support...62 AI.2.3 FDP User data protection...63 AI.2.4 FIA Identification and authentication...64 AI.2.5 FMT Security management...65 AI.2.6 FPR Privacy...66 AI.2.7 FPT Protection of the TSF...67 AI.2.8 FRU Resource utilisation...68 AI.2.9 FTP Trusted path/channels

5 Foreword Successful implementation of European Directive 1999/93/EC on a Community framework for electronic signatures [Dir.1999/93/EC] requires standards for services, processes, systems and products related to electronic signatures as well as guidance for conformity assessment of such services, processes, systems and products. In 1999 the European ICT Standards Board, with the support of the European Commission, undertook an initiative bringing together industry and public authorities, experts and other market players, to create the European Electronic Signature Standardisation Initiative (EESSI). Within this framework the Comité Européen de Normalisation / Information Society Standardisation System (CEN/ISSS) and the European Telecommunications Standards Institute / Electronic Signatures and Infrastructures (ETSI/ESI) were entrusted with the execution of a work programme to develop generally recognized standards to support the implementation of [Dir.1999/93/EC] and development of a European electronic signature infrastructure. The CEN/ISSS Workshop on electronic signatures (WS/E-SIGN) resulted in a set of deliverables, CEN Workshop Agreements (CWA), which contributed to those generally recognized standards. The present document is one such CWA. CWA has defined a Common Criteria Protection Profile (PP) for secure signature creation devices (SSCDs), referred to as [SSCD PP] in the remainder of this document. The SSCD PP was based on the working assumption of a general technology-neutral approach that has solely been based on the requirements that are defined by the Directive. Whilst this allows for swift and harmonised realization of the Directive in an implementation-independent manner, a side effect is that the general SSCD PP neither could emphasize strengths of any certain technology promising to be capable to deploy electronic signatures, nor could the value added of employing CC evaluated SSCDs in e commerce areas (referred to as 5.2 signatures ) be sufficiently addressed. The purpose of CWA is therefore to extend the previous work towards defining guidelines on implementing SSCDs in specific platforms (such as smart cards, PCs, PDAs and mobile phones) and in specific environments (such as public terminals or secured environments). This CWA is intended for use by both legal and technical experts in the area of electronic signatures, as well as designers of systems and products in this area. This version of this CWA was published A list of the individuals and organizations which supported the technical consensus represented by this CEN Workshop Agreement is available to purchasers from the CEN Central Secretariat. 5

6 1 Scope Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures [Dir.1999/93/EC] referred to as the Directive in the remainder of this document specifies requirements for secure signature-creation devices (SSCDs) in its Annex III. CWA clarifies these SSCD security requirements as Protection Profiles that follow the provisions of the Common Criteria (CC) [SSCD PP]. A technology neutral approach has been followed by these PPs. The present document gives guidance on the implementation of [SSCD PP] for specific platforms (e.g. smart cards, personal data assistants, mobile phones, or PCs) and the operation in specific environments (e.g. public terminals or secured environments). The document is intended both for vendors preparing to write a Security Target (ST) conforming to the SSCD PP as well as for users with a need to understand the capabilities of different technical solutions for fulfilling the SSCD PP. A further objective of the document is to compare [SSCD PP] to similar PPs or other well established evaluation standards. This shall assist implementers and ST writers in identifying roads of how to develop products that meet other standards in addition to the SSCD PPs and thus shall assist in avoiding duplicate evaluation processes. The document limits its scope to electronic signatures based on asymmetric cryptography, i.e. to digital signatures based on private key public key pairs. 6

7 2 References 2.1 Normative references This CEN Workshop Agreement incorporates by dated or undated reference, provisions from other publications. These normative references are cited at the appropriate places in the text, and the publications are listed hereafter. For dated references, subsequent amendments to or revisions of any of these publications apply to this CEN Workshop Agreement only when incorporated in it by amendment or revision. For undated references the latest edition of the publication referred to applies (including amendments). [ALGO] [CWA 14170] ETSI SR Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures V1.1.1 ( ). CWA 14170: Security Requirements for Signature Creation Applications. [CWA ] CWA : Cryptographic Module for CSP Key Generation Services - Protection Profile (CMCKG-PP), [Dir.1999/93/EC] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a community framework for electronic signatures [ISO 15408] ISO/IEC to , 1999: Information technology - Security techniques - Evaluation criteria for IT security Part 1: Introduction and general model, Part 2: Security functional requirements, Part 3: Security assurance requirements. [SSCD PP] CWA 14169: Security Requirements of Secure Signature Creation Devices(SSCD) 2.2 Informative references [CMCSO PP] [DFA] [DPA] [FA] [ISO 7816] PP 9806] [PP 9911] [PP 0002] [PP 0010] CWA : Cryptographic Module for CSP Signing Operations Protection Profile, CMCSO-PP E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Advances in Cryptology Proceedings of CRYPTO 97. P. Kocher, J. Jae and B. Jun, Differential Power Analysis, Advances in Cryptology, Proceedings of CRYPTO 99, 1999, pp D. Boneh, R.A. Demillo, R.J. Lipton, On the importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology, Proceedings of EUROCRYPT 97. ISO/IEC 7816: Identification cards Integrated circuit cards with contacts. French Certification Body PP/9806: Protection Profile Smart Card Integrated Circuit, Version 2.0, Eurosmart, September French Certification Body PP/9911: Protection Profile Smart Card Integrated Circuit with Embedded Software, Version 2.0, Eurosmart, June Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0002: Smartcard IC Platform Protection Profile, Version 1.0, Eurosmart, July French Certification Body PP/0010: Protection Profile Smart Card IC with Multi- Application Secure Platform, Version 2.0, Eurosmart, November [SCSUG] Smart Card Security User Group: Smart Card Protection Profile, version 3.0, September [TA] P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology, Proceedings of CRYPTO 96, pp

8 [TAMPER] [TCPA] [TPMPP] [TS ] [WAPWIM] R.J. Anderson, M.G. Kuhn: Tamper Resistance - a Cautionary Note, Proceedings of Second USENIX Workshop on Electronic Commerce pp. 1-11, Trusted Computing Platform Alliance, Main Specification, version 1.1a, November Trusted Platform Module Protection Profile (TCPA-TPMPP), version 1.0, December ETSI SEC, Policy requirement for certification authorities issuing qualified certificates, Technical Specification ETSI TS WAP Identity Module, WAP-260-WIM, WAP Forum, Ltd. 8

9 3 Terms and definitions, abbreviations 3.1 Terms and definitions Qualified signature Type 1 SSCD 'Trusted channel' 'Trusted path' means an electronic signature that fulfils the requirements laid down in the Directive [Dir.1999/93/EC] article 5(1), i.e. an advanced electronic signature which is based on a qualified certificate and which is created by a secure-signature-creation device. means an SCD/SVD generation device different from the SSCD used by the signatory. This can either be a device evaluated against [SSCD PP, Type 1], against [CWA ] or a device that fulfils the corresponding requirements of [Dir.1999/93/EC]. is a communication channel that may be initiated by either side of the channel, and provides non-repudiation characteristics with respect to the identity of the sides of the channel [ISO 15408]. provides a means for users to perform functions through an assured direct interaction with the TSF. Trusted path is usually desired for user actions such as initial identification and/or authentication, but may also be desired at other times during a user s session. Trusted path exchanges may be initiated by a user or the TSF. User responses via the trusted path are guaranteed to be protected from modification by or disclosure to untrusted applications [ISO 15408]. 3.2 Abbreviations APDU CAD CBC Application Protocol Data Unit Card Acceptor Device Cipher Block Chaining CC Common Criteria Version 2.1 CCS CEN Cryptographic Checksum Comité Européen de Normalisation (European Committee for Standardization) CEN/ISSS CEN Information Society Standardization System CGA CSP CWA DTBS DTBSR DFA DPA EAL EC EESSI EFP Certification Generation Application Certification Service Provider CEN Workshop Agreement Data to be Signed Data to be Signed Representation Differential Fault Analysis Differential Power Analysis Evaluation Assurance Level European Commission European Electronic Signature Standardization Initiative Environment Failure Protection 9

10 EFT ETSI Environment Failure Testing European Telecommunications Standards Institute ETSI SEC ETSI Security Technical Committee HI HW IC I/O ISSS MAC OS PC PDA PIN PP PUK RAD SCA SCD SDO SDP SFP SFR SIM SOF SPA SSCD SVD S/WIM TOE VAD WAP WIM Human Interface Hardware Integrated Circuit Input/Output Information Society Standardisation System Message Authentication Code Operating System Personal Computer Personal Digital Assistant Personal Identification Number Protection Profile PIN Unblocking Key Reference Authentication Data Signature-Creation Application Signature-Creation Data Signed Data Object Signer s Document Presentation Component Security Function Policy Security Functional Requirement Subscriber Identification Module Strength of Function Simple Power Analysis Secure Signature-Creation Device Signature-Verification Data SIM-based WIM Target of Evaluation Verification Authentication Data Wireless Access Protocol WAP Identity Module WS/E-SIGN CEN/ISSS Electronic Signatures workshop 10

11 3.3 Document conventions The document follows a few conventions to point out quotations taken from normative references or to highlight clauses that are referred to frequently throughout the document: Quotations taken from normative references carry a 2 pt frame, as given in the example below. Article 3 lit. 5 of 93/1999/EC The Commission may, in accordance with the procedure laid down in Article 9, establish and publish reference numbers of generally recognised standards for electronic-signature products in the Official Journal of the European Communities. Member States shall presume that there is compliance with the requirements laid down in Annex II, point (f), and Annex III when an electronic signature product meets those standards. To highlight statements that are referred to frequently in the document numbered clauses in a 10 pt bold Arial font are given, such as in the following example Clause 0. Several standards that fulfil the requirements laid down in Annex III may be published in the Official Journal of the European Communities. 11

12 4 SSCD-related provisions of the Directive The purpose of [SSCD PP] is to implement the provisions of the Directive [Dir.1999/93/EC] Annex III as a Common Criteria PP, i.e. in a technology neutral manner that covers the security requirements but leaves the field open for the market to implement SSCDs in a variety of technologies. As Annex III can not be viewed detached from the Directive as a whole, this section discusses the partly controversial assumptions and interpretations of the Directive on which the [SSCD PP] is based on. 4.1 Relevant definitions Article 2 of 93/1999/EC 1. electronic signature means data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication; 2. advanced electronic signature means an electronic signature which meets the following requirements: (a) it is uniquely linked to the signatory; (b) it is capable of identifying the signatory; (c) it is created using means that the signatory can maintain under his sole control; and (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable; For the purpose of this document only advanced signatures are of relevance, as the Directive refers to SSCDs and Annex III only in the context of advanced signatures. This is further discussed with respect to recital (15) of the Directive in section 4.2. Clause 1. For advanced signatures the signatory must be capable to maintain usage of the SCD under his control. This does not imply a requirement to prevent the signatory from giving up such a control such as binding the SCD to biometric characteristics of the signatory. The main provision given in the definition of advanced signatures above and repeatedly referred to in the remainder of this document is that advanced signatures are created by means which the signatory can maintain under his sole control. This essentially implies that: (a) No entity other than the signatory may acquire the means of creating such an advanced electronic signature; (b) However, it may well be in the power of the signatory to give up this sole control. Although statement (b) sounds odd considering that electronic signatures per definition serve as a method of authentication, it seems important to emphasise that here simply because no mandatory technical means to prevent the signatory from giving up his control can be derived from the Directive. Thus, mandating the inclusion of biometric characteristics may not be argued by reliance upon the definition of advanced electronic signatures. For identification by knowledge such as entering a personal identification number (PIN) the SSCD can do virtually nothing to prevent the signatory from giving the PIN to others. 12

13 Article 2 of 93/1999/EC 3. signatory means a person who holds a signature-creation device and acts either on his own behalf or on behalf of the natural or legal person or entity he represents; 4. signature-creation data means unique data, such as codes or private cryptographic keys, which are used by the signatory to create an electronic signature; 5. signature-creation device means configured software or hardware used to implement the signaturecreation data; Clause 2. To implement the SCD includes generation, storage, usage, and destruction of the SCD, even if at time of generation of the SCD the signatory is not known. The relationship between the signatory and the electronic signature is defined via the device that implements the signature-creation data (SCD). In the context of this document the provision of to implement is interpreted as any interaction with the SCD throughout its lifecycle, regardless of whether at a certain point in time a corresponding certificate exists or not. Consequently, this covers the creation of the SCD, its storage, its usage, and its destruction. Thus, for processes such as pre-personalisation of smartcards Annex III applies, even if the signatory is not yet known. The basic argument behind that interpretation is that otherwise both the definition of an advanced signature and the provisions of Annex III are violated: It is conceivable that the SCD has been used before without the signatory s sole control, and thus without the signatory being able to protect the SCD against that use. 4.2 General provisions given as recitals Recital (15) of 93/1999/EC Annex III covers requirements for secure signature-creation devices to ensure the functionality of advanced electronic signatures; it does not cover the entire system environment in which such devices operate; the functioning of the internal market requires the Commission and the Member States to act swiftly to enable the bodies charged with the conformity assessment of secure signature devices with Annex III to be designated; in order to meet market needs conformity assessment must be timely and efficient; The main aspect of recital (15) influencing [SSCD PP] is that the scope of Annex III and thus the scope of mandatory conformity assessment carried out by designated bodies is limited to the SSCD. As explained later on, an SSCD is basically the device allowed to touch the SCD. In the context of this document the SCD is a private cryptographic key and touching that private key may occur during creation, storage, usage, and destruction. In terms of [ISO 15408] this means that the target of evaluation (TOE) is the SSCD, i.e. again the device touching the SCD. Although an implementer may decide to include additional elements such as display elements, I/O elements, or document generation into the evaluation process to increase his customers confidence in the product, this is not a requirement that can be derived from the Directive. The boundary between the TOE and its immediate environment, i.e. the interface between them, is one of the main issues addressed by these guidelines and is further discussed throughout this document. Recital (18) of 93/1999/EC The storage and copying of signature-creation data could cause a threat to the legal validity of electronic signatures; Clause 3. SCD shall not be backed up or escrowed. For qualified signatures no duplicates of the SCD shall exist even with the consent of the signatory. If SCD is transferred, the source copy shall be reliably destroyed. 13

14 Two main threats are created if duplicates of SCD are allowed: Firstly, electronic signatures may be created without the consent of the identity attested to by the corresponding certificate. This jeopardizes the authentication property aimed by electronic signatures in general. Secondly, the non-repudiation property that can be derived from electronic signatures is threatened if the signatory may claim that there is a practical possibility that a copy of the SCD exists. Thus, regardless of whether such duplicates of SCD are created with or without the consent or knowledge of the signatory, the interests of both the signatory and of the relying party would be jeopardized by such duplicate SCD. Recital (18) refers to electronic signatures in general, not only SCD stored in SSCD. For SSCDs, duplicates of the SCD are explicitly excluded by the provisions given in Annex III. 4.3 Technical aspects of provisions given in Annex III Annex III of 93/1999/EC 1. Secure signature-creation devices must, by appropriate technical and procedural means, ensure at the least that: (a) the signature-creation-data used for signature generation can practically occur only once, and that their secrecy is reasonably assured; Clause 4. There must be no practicable technical means to reveal the SCD to any entity including the signatory. Clause 5. Generation of SCD shall be based on random processes that keep the probability of duplicate SCD negligibly low. Means to prove singleness of the SCD are not required. Annex III 1(a) has several impacts on the technical implementation of SSCDs: the SCD must remain secret and the SSCD must ensure that secrecy by technical means; there must be no means to circumvent the secrecy-provision required by the Directive, even with the consent of the legitimate signatory; proof of uniqueness of the SCD is not required since: o o comparison of SCDs requires knowledge of the SCD, which would violate the provision of SCD secrecy, and comparison of the SVD to other SVDs (which would indicate duplicate SCDs) would still only be possible within the domain of the SSCD provider. The technical consequence of Annex III 1(a) is that SCD generation shall be based on a random process with sufficient quality to ensure that no duplicate SCDs exist, i.e. a process carrying sufficient entropy. The decision whether a certain SCD generation process is eligible is beyond the scope of [SSCD PP] eligible key generation processes are defined in [ALGO]. The evaluation of the SSCD provides assurance that the processes are appropriately implemented. A further consequence for implementers of SSCDs that is to be derived from Annex III 1(a) is that the protection of SCD secrecy needs to be done by both technical and procedural means. As expressed before for clause 2, an SCD generation service should be considered as part of the SSCD even if the signatory is not yet known. SCD generation at a certification service provider (CSP), where SCD secrecy is solely based on procedural means, would for example violate Annex III 1(a) technical means also need to be in place within the SCD generation service in order to protect the SCD. 14

15 Annex III of 93/1999/EC 1. Secure signature-creation devices must, by appropriate technical and procedural means, ensure at the least that: (b) the signature-creation-data used for signature generation cannot, with reasonable assurance, be derived and the signature is protected against forgery using currently available technology; Clause 6. Strong protection to ensure SCD secrecy needs to be in place. Clause 7. Strong cryptography is required to prevent forgery of electronic signatures. Clause 8. No provisions for long-term validity in addition to Clause 7 are mandatory for SSCDs such as time-stamps or re-signing. The technical effects that may be derived from Annex III 1(b) are no means of deriving the SCD may be feasible either o o o o from the implementation of the SCD (which per definition is the SSCD), from the signature-generation process itself, from the cryptographic protocols, or by any other means protection against forgery of signatures requires an appropriate cryptographic strength In addition, forgery of signatures explicitly refers to currently available technology. The provision does not exclude that a signature may be forged using future technology. As a consequence, no additional mandatory technical or procedural requirements on SSCD regarding long term validity of electronic signatures can be derived. The assessment whether a certain signature suite is eligible to prevent forgery from a theoretical perspective is beyond the scope of [SSCD PP] this is defined in [ALGO]. It is the implementation of the suite that is covered by the PP. Annex III of 93/1999/EC 1. Secure signature-creation devices must, by appropriate technical and procedural means, ensure at the least that: (c) the signature-creation-data used for signature generation can be reliably protected by the legitimate signatory against the use of others. The definition of advanced electronic signatures includes that the means of creation of such a signature can be under sole control of the signatory. Annex III 1(c) refines that requirement in the sense that the SSCD must provide a means by which the signatory can protect the use of the SCD. Technical consequences are: For the use of the SCD the SSCD must be capable to distinguish between the signatory and others, i.e. there must be a means to identify the legitimate signatory Protected by indicates the capability that the signatory may take an active role in that protection, e.g. by actively selecting data used for identification by knowledge. For identification by knowledge, the secret such as the PIN may not be guessable. Therefore the SSCD must provide technical means that a certain quality is given to reach reliable protection. An example guideline is that defined by banking standards for teller machines. 15

16 Annex III of 93/1999/EC 2. Secure signature-creation devices must not alter the data to be signed or prevent such data from being presented to the signatory prior to the signature process. Clause 9. It may be upon the signatory s decision to have data-to-be-signed presented. Annex III 2 ensures that the signatory is able to be presented with the data to be signed, prior to signing it, and ensures that this data has not been altered by the SSCD. There is no derived requirement that the SSCD must ensure that presentation of DTBS actually took place. An SSCD may for example have the option that the signatory may create a series of signatures for different DTBS without presenting them, as long as the signatory can also have each DTBS presented. On the other hand, if a certain implementation presents each DTBS to the signatory without the signatory being able to suppress the presentation, this is also a valid approach with respect to Annex III SSCD-related provisions on qualified certificates and CSP Qualified certificates must contain Annex I of 93/1999/EC (e) signature-verification data which correspond to signature-creation data under the control of the signatory; Clause 10. The SSCD shall be capable of assisting in proving correspondence between the SVD and the SCD. The SVD stored in the certificate must correspond to the SCD the signatory uses for signing. Therefore, the SSCD needs to assist the certification generation application (CGA) in proving this correspondence. It is important to consider that such a proof of possession usually requires use of the SCD and may not interfere with other provisions of the Directive. For example, an approach to sign random challenges carries some threats and must be avoided, as the signatory has virtually no chance to distinguish between a nonce supposed to be such a random challenge and the hash value of a document the signatory actually does not intend to sign. The proof of correspondence between the SCD and SVD therefore needs to be viewed separately from the usage of the SCD for signing. For example, RFC 2511 requires that for proof-ofpossession, the SVD shall be only be used to sign the SVD, or a password-based MAC of the SVD. This prevents the risk of a rogue none. Annex II of 93/1999/EC Certification-service-providers must: (g) take measures against forgery of certificates, and, in cases where the certification-serviceprovider generates signature-creation data, guarantee confidentiality during the process of generating such data; (j) not store or copy signature-creation data of the person to whom the certification-serviceprovider provided key management services; The provisions given above, although not directly related to Annex III, are supporting clause 4 that the SCD must remain secret. The proof of correspondence between SCD and SVD is provided by using the SSCD as discussed for clause 10 above. 16

17 5 Explanatory amendments to CWA In this section the [SSCD PP] is explained. First, general implementation guidelines explaining the [SSCD PP] are given in section 5.1. A detailed discussion of major issues to be covered by implementers is then given in section General implementation guidelines In this section, an overview of the [SSCD PP] is given in the technology neutral manner of [SSCD PP] itself. This is done for two reasons: This shall keep the document self-contained, although due to its strong relation it can not be viewed separate from [SSCD PP] The overview shall give an extension to the descriptive parts of [SSCD PP] and thus assist implementers in getting an initial insight into how the SSCD-requirements have been translated to Common Criteria [ISO 15408] by the developers of [SSCD PP]. Therefore, the section is structured as follows: In section a high-level view of the signature creation process is given. This gives an overview of the components and interfaces involved. The different types of SSCDs are discussed in section Section continues by discussing the borderlines that have been drawn with respect to the separation between the TOE and its environment SSCD overview From a simplified perspective, the signature-creation process employing the SSCD can be described as follows: Generation of the SCD-SVD pair (the keys) and the corresponding certificate is carried out during an initialisation phase. This is illustrated on the right hand side of the following figure. In the usage phase, DTBS such as a document is signed by the signatory. To maintain the sole control property, authentication of the signatory needs to be in place, for example by entering a PIN. Signature generation DTBS DTBS presentation, DTBSR import Certificate generation User authentication, User identification SSCD e.g. smartcard SCD/SVD generation Even in this sketchy figure that for the moment neglects the various implementation options of SSCDs, several basic threats can be identified, such as: The SCD is a primary asset to be protected (in confidentiality) during both initialisation and usage, since an attacker obtaining control of the SCD may create any number of signatures without the consent of the signatory. Authentication data is a primary asset, since an attacker getting hold of both the SSCD and the authentication data may create signatures impersonating the legitimate signatory. 17

18 Data communicated during initialisation needs to be protected to prevent an attacker from obtaining a certificate identifying the signatory, but containing the attacker s SVD. Data communicated during the usage phase needs to be protected, to prevent the PIN from being disclosed to an attacker or the DTBSR being replaced by data chosen by an attacker SSCD Types During the development of [SSCD PP] a distinction was made depending on two basic alternatives in the initialisation (key generation) phase: The SCD-SVD pair may be generated in the SSCD that is used by the signatory for signing, or a dedicated SCD/SVD-pair generation device is employed which transfers the SCD to the SSCD used for signing. This resulted in three basic SSCD Types, for which general implementation aspects are discussed in the following sub-sections: SSCD Type 1: SCD/SVD-pair generation SSCD Type 2: Signature-creation SSCD Type 3: Both SCD/SVD-pair generation and signature-creation SSCD Type 1 The generation of cryptographic keys is a critical factor for the quality of cryptographic products. However, for digital signatures employing asymmetric cryptography, the key generation may be resource-consuming for several reasons: Generation of keys and testing their strength is usually computationally demanding. The requirement for sufficient entropy (see Clause 5) requires good physical random generators such as good noise sources. System designers may well decide to employ dedicated SCD-SVD pair generation devices specifically designed for the demanding key generation process, thus eliminating the need to include such function blocks in the device used for signature-creation, which may be a mass produced device. With reference to Clause 2 an SCD-generation device may be considered to be an SSCD. The device, in terms of the [SSCD PP], is then an SSCD Type 1. Its main function blocks, illustrated in the figure below, are as follows: SCD/SVD Generation. SCD Export to the signature-creation device of the signatory called SSCD Type 2 in terms of [SSCD PP]. SVD Export, either directly to the CGA for certificate generation, or to the SSCD Type 2 that communicates the SVD to a CGA at a later stage. SSCD Type 1 SVD Export SCD Export SCD/SVD Generation User Authentication 18

19 SSCD Type 2 The counterpart of the SSCD Type 1 is the SSCD Type 2 which is the personal device used for signaturecreation by the signatory. It is thus a personalised device, and its main functional blocks, illustrated in the figure below, are the following: Personalisation, which is the process of applying unequivocal signatory-related data, including o Reference authentication data (RAD) such as PIN and PIN Unblocking Key (PUK) o SCD which is imported from an SSCD Type 1 o SVD corresponding to the SCD, imported from an SSCD Type 1. Note, that this is optional as the SVD is not necessarily held in the SSCD. Signature creation User authentication, ensuring that the signatory can maintain sole control of the signature-creation function SSCD Type 2 Personalisation SVD Import / SVD Export User Authentication Signature-Creation User Authentication SCD Import SSCD Type 3 If the SCD-SVD pair is generated on board the SSCD that is used for signing by the signatory, the resulting device is in terms of [SSCD PP] an SSCD Type 3. An SSCD Type 3 is a self-contained device which may be considered as a combination of an SSCD Type 1 and an SSCD Type 2. The main obvious difference is that the SCD need not be communicated outside the SSCD as shown in the figure below. The main building blocks of the SSCD Type 3 are, as follows: SCD/SVD generation SVD Export to the CGA for certificate generation, whereas the SCD remains in the SSCD Personalisation, which is the process of applying unequivocal signatory-related data such as RAD Signature-creation User authentication, ensuring that the signatory can maintain sole control of the signature-creation function SSCD Type 3 Personalisation User Authentication Signature-Creation User Authentication SVD Export SCD/SVD Generation User Authentication 19

20 5.1.3 TOE vs. TOE IT-environment In the light of the three different SSCD Types described above, three different PPs have been developed in [SSCD PP] one for each SSCD Type. An implementer and ST writer needs to choose the appropriate PP to claim conformance to. In this section, the limits of the TOE are discussed. [SSCD PP] derived the components that are necessary parts of the TOE from Annex III of the Directive. An implementer is free to integrate further components into the TOE, such as a document viewer, which however is beyond of the scope of this general section but is further discussed in the remainder of this document. The distinction between the TOE and its environment is dependent on the SSCD Type. Therefore, the following section discusses this distinction for SSCD Type 1 and SSCD Type 2. The subsequent section discusses the TOE limits that are common to all SSCD Types SSCD Type 1 and SSCD Type 2 Regarding the distinction between the TOE and its environment there is an obvious interrelation between an SSCD Type 1 and an SSCD Type 2: In case of an SSCD Type 1 TOE, the TOE exports the SCD to an SSCD Type 2, i.e. the SSCD Type 2 is an IT environment of the TOE. The same applies for the SVD in cases where the SVD is communicated from the TOE to the SSCD Type 2. On the other hand, in case of an SSCD Type 2 TOE, the SCD is imported from an SSCD Type 1. Thus the SSCD Type 1 is an IT environment of the TOE. The same applies for the SVD in cases where the SVD is communicated from the TOE to the SSCD Type 2. The scenario discussed above is illustrated in the figure below. In order to meet the requirement of SCD secrecy, a so-called trusted channel has been defined in [SSCD PP] between the SSCD Type 1 and the SSCD Type 2. The purpose of the trusted channel is to maintain the SCD confidentiality and SCD integrity when in transit. For the optional transfer of the SVD a trusted channel has been defined that shall maintain the SVD integrity. Trusted channels are further discussed in section SSCD Type 2 Personalisation SVD Import / SVD Export User Authentication Signature-Creation User Authentication SCD Import Trusted channel SSCD Type 1 SVD Export Trusted channel SCD Export SCD/SVD Generation User Authentication Note that, with reference to the definition in section 3.1, the SSCD Type 1 is not necessarily a device that is evaluated against [SSCD PP], as other devices that conform to [Dir.1999/93/EC] may be employed All SSCD Types In addition to the interrelation between the SSCD Type 1 and the SSCD Type 2, the TOE communicates with a number of applications that constitute the IT environment of the TOE: The SVD is transferred from the SSCD to the CGA for certificate generation. Therefore, a trusted channel has been defined in [SSCD PP] in order to maintain the SVD integrity. 20

21 The DTBSR is transferred from the SCA to the SSCD for signature creation. Therefore, a trusted channel has been defined to maintain the DTBSR integrity. The technical means to enable the signatory to initiate the signature-creation under his sole control is provided by user authentication. Therefore, a so-called trusted path to the human interface (HI) has been defined in [SSCD PP]. During the development of [SSCD PP] devices that integrate the HI in the TOE have been anticipated and therefore, no such trusted path is needed in that case. Considering that an SSCD Type 3 may be a combination of an SSCD Type 1 and an SSCD Type 2, the distinction between the TOE the certain SSCD Type and its environment is illustrated in the figure below. Note that there is obviously no direct interface to an SCA and a HI for an SSCD Type 1. On the other hand, the interface between the SSCD Type 2 and a CGA is only required for cases where the SSCD Type 2 holds the SVD and exports it for certificate generation. SCA DTBS-representation SDO CGA ** SVD into cert. Trusted channel Trusted channel ** SSCD Type 2 Personalisation SVD Import / SVD Export HI Authentication data Trusted path* User Authentication Signature-Creation User Authentication SCD Import SCA DTBS-representation SDO Trusted channel SSCD Type 3 Personalisation HI A uthentication data Trusted path* User Authentication Signature-Creation User Authentication Trusted channel SSCD Type 1 SVD Export Trusted channel SCD Export SVD Export CGA Init. / SVD into cert. Trusted channel SCD/SVD Generation User Authentication CGA Init. / SVD into cert. Trusted channel SCD/SVD Generation User Authentication 5.2 Guidelines on specific matters of interest In this section, aspects deemed of particular interest for implementers are discussed. Such issues considered worthwhile paying special attention to have either been raised repeatedly by implementers or have been a source of intense interest during the development of the SSCD PPs Inter-TSF trusted channel (FTP_ITC) and trusted path (FTP_TRP) Reasoning for selection AN SSCD communicates sensitive data to other IT products, such as the SCD or VAD transferred between an SSCD Type 1 and an SSCD Type 2, or with users. Therefore, trusted channels FTP_ITC and trusted paths FTP_TRP have been defined. These trusted channels/paths for the TOE are: FTP_ITC/SCD Export (SSCD Type 1) and FTP_ITC/SCD Import (SSCD Type 2): The SCD is transferred between an SSCD Type 1 and an SSCD Type 2. With reference to Annex III 1 (a), clause 4 respectively, the SSCD needs to ensure the secrecy of the SCD. FTP_ITC/SVD Export, SVD Transfer (SSCD Types 1, 2, and 3) SVD integrity shall be protected when transferred to the CGA for certification FTP_ITC/DTBS import (SSCD Type 2 and 3) The SSCD must prevent alteration of the DTBS. DTBS-representation in transit between the SCA and the SSCD needs to be protected by the trusted channel 21

22 FTP_TRP/TOE, SCA For authentication of the signatory a Human Interface (HI) is required, e.g. for entering a PIN. If this HI is not provided by the SSCD, the sensitive data (VAD) needs to be protected Implementation examples Secure messaging, as defined for smartcards in [ISO 7816] part 4 and in part 8 for extended functions, represents one option to implement a trusted channel. It allows secure transfer of application protocol data units (APDUs) between the terminal and the smartcard. Two modes represent potential candidates to be used with SSCDs: Authentic mode: A cryptographic checksum (CCS) is calculated over the APDU, e.g. a keyed message authentication code (MAC) or a MAC based on a symmetric block cipher in cipher block chaining (CBC) operational mode. This provides data integrity of the data transferred, but does not provide data confidentiality. Combined Mode: In the combined mode, an APDU that has been protected in authentic mode is padded and encrypted. This provides both data integrity and data confidentiality. The combined mode fits the requirements for transferring the SCD. For SVD transfer or DTBS-representation carrying no confidential data both the authentic mode and the combined mode may be used. Smartcards usually employ symmetric algorithms to implement secure messaging, still asymmetric algorithms are possible. However, in either case cryptographic keys are required raising the problem of protecting these keys. While protecting the keys used for secure messaging is not assumed problematic for the SSCD, as implementation of protection measures are required for the SCD anyhow, the storage of cryptographic keys in the SSCD environment is to be viewed differently, as revealing these keys is critical. Depending on the actual implementation which is discussed in detail in section 7, a desirable advantage is achieved if the SSCD authenticates the environment e.g. a secure smartcard terminal in a manner verifiable by the signatory and before sensitive data such as signatory s VAD (e.g. the PIN) are transferred. An example of authenticating the environment that has been implemented with smartcards is that a secret selected by the signatory is stored in the SSCD. Only after the terminal has been successfully authenticated this secret is revealed and displayed to the signatory. Provided that the terminal itself properly protects these authentication data to avoid attacks on the terminal that passes the secret to an attacker, the signatory has confidence in the trustworthiness of the terminal and may proceed with the signature. The examples given above for the trusted path/channel are closely related to secure messaging which is implemented in many smart cards and card acceptor devices. For off-the-shelf products such as PCs, methods similar to the authentic mode or the combined mode are conceivable. However, such devices are not yet very common for PCs. If implementing methods similar to secure messaging, the storage of the required cryptographic keys need to be considered. A development in that area that may assist in implementing the required functions is the trusted platform module [TPMPP] which has been developed within the trusted computing platform alliance [TCPA] TOE Emanation (FPT_EMSEC) Reasoning for selection The major assets to be kept secret by the SSCD are the SCD and RAD. Limiting the protection to physical measures such as FPT_PHP has been considered insufficient due to sophisticated attacks such as power analysis or timing attacks. To counter these attacks a family FPT_EMSEC has been defined to ensure that neither the TOE emanates information relating to the SCD or RAD, nor that the interfaces can be used to get access to these assets. [SSCD PP] FPT_EMSEC.1.1 The TOE shall not emit [assignment: types of emissions] in excess of [assignment: specified limits] enabling access to RAD and SCD. 22

Protection Profile Secure Signature-Creation Device Type 3

Protection Profile Secure Signature-Creation Device Type 3 Protection Profile Secure Signature-Creation Device Type 3 Version: 1.05, EAL 4+ Wednesday, 25 July 2001 Prepared By: ESIGN Workshop - Expert Group F Prepared For: CEN/ISSS Note: This Protection Profile

More information

ONR CEN/TS 419241. Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) DRAFT ICS 35.240.

ONR CEN/TS 419241. Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) DRAFT ICS 35.240. ICS 35.240.99 DRAFT ONR CEN/TS 419241 Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) Sicherheitsanforderungen für Vertrauenswürdige Systeme, die Serversignaturen

More information

CardOS V4.4 CNS. Edition 04/2010. Security Target CardOS V4.4 CNS with Application for QES

CardOS V4.4 CNS. Edition 04/2010. Security Target CardOS V4.4 CNS with Application for QES CardOS V4.4 CNS Security Target CardOS V4.4 CNS with Application for QES Edition 04/2010 CardOS V4.4 CNS: ST Edition 04/2010 Public 1 The reproduction, transmission or use of this document or its contents

More information

Protection Profiles for TSP cryptographic modules Part 1: Overview

Protection Profiles for TSP cryptographic modules Part 1: Overview Date: 2015-08 prts 419221-1:2015 Protection Profiles for TSP cryptographic modules Part 1: Overview Document type: Technical Specification Document language: E Contents Introduction...3 1 Scope...4 2 References...4

More information

This document is a preview generated by EVS

This document is a preview generated by EVS CEN WORKSHOP CWA 16926-7 August 2015 AGREEMENT ICS 35.240.40; 35.240.15; 35.200 English version Extensions for Financial Services (XFS) interface specification Release 3.30 - Part 7: Check Reader/Scanner

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by

BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt

More information

EN ISO 14121-1. Safety of machinery Risk assessment. Sicherheit von Maschinen Risikobeurteilung Teil 1: Leitsätze (ISO 14121-1:2007)

EN ISO 14121-1. Safety of machinery Risk assessment. Sicherheit von Maschinen Risikobeurteilung Teil 1: Leitsätze (ISO 14121-1:2007) ÖNORM EN ISO 14121-1 Edition: 2008-01-01 Safety of machinery Risk assessment Part 1: Principles (ISO 14121-1:2007) Sicherheit von Maschinen Risikobeurteilung Teil 1: Leitsätze (ISO 14121-1:2007) Sécurité

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL SPECIFICATION SPÉCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CEN ISO/TS 17573 June 2003 ICS 35.240.60 English version Road Transport and Traffic Telematics Electronic Fee Collection (EFC) System

More information

ÖNORM EN 1504-8. The European Standard EN 1504-8 has the status of an Austrian Standard. Edition: 2005-02-01. Standards group B

ÖNORM EN 1504-8. The European Standard EN 1504-8 has the status of an Austrian Standard. Edition: 2005-02-01. Standards group B ÖNORM EN 1504-8 Edition: 2005-02-01 Standards group B Identical (IDT) with EN 1504-8:2004 ICS 91.080.40 Products and systems for the protection and repair of concrete structures Definitions, requirements,

More information

J-SIGN Security Target Public Version

J-SIGN Security Target Public Version STMicroelectronics J-SIGN Security Target Public Version Common Criteria for IT security evaluation J-SIGN_Security_Target_Lite Rev. A April 2015 J-SIGN_Security_Target_Lite_A - page 1 BLANK J-SIGN_Security_Target_Lite_A

More information

LINQUS USIM 128K Smartcard

LINQUS USIM 128K Smartcard LINQUS USIM 128K Smartcard ESIGN PKI Signature Application On GemXplore Generations G152B-EP3B OS platform, Running on Infineon SLE88CFX4002P/m8834b17 chip Ref T1004530 A3 / Version 1.0 Common Criteria

More information

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security

More information

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

ETSI TS 101 456 V1.4.3 (2007-05)

ETSI TS 101 456 V1.4.3 (2007-05) TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3

More information

Electronic Signature: Conform to the CC Anytime, Anywhere, with any Device September 20, 2012

Electronic Signature: Conform to the CC Anytime, Anywhere, with any Device September 20, 2012 Electronic Signature: Conform to the CC Anytime, Anywhere, with any Device September 20, 2012 DICTAO 152, avenue Malakoff 75116 PARIS, France Tel. : +33 (0)1 73 00 26 10 Internet : www.dictao.com Agenda

More information

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2. Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to

More information

Security Target Lite STARCOS 3.4 Health HBA C1

Security Target Lite STARCOS 3.4 Health HBA C1 Security Target Lite STARCOS 3.4 Health HBA C1 Version 2.0/09.06.2011 Author: Giesecke & Devrient GmbH Document status: Final Giesecke & Devrient GmbH Prinzregentenstr. 159 Postfach 80 07 29 81607 München

More information

COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 1515-1:2000

COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 1515-1:2000 EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM EN 1515-1 November 1999 ICS 21.060.10; 21.060.20; 23.040.60 English version Flanges and their joints - Bolting - Part 1: Selection of bolting Brides

More information

Metallic products Types of inspection documents

Metallic products Types of inspection documents BRITISH STANDARD BS EN 10204:2004 Metallic products Types of inspection documents The European Standard EN 10204:2004 has the status of a British Standard ICS 01.110; 77.080.01; 77.120.01 BS EN 10204:2004

More information

DRAFT ÖNORM EN 16602-40-12

DRAFT ÖNORM EN 16602-40-12 DRAFT ÖNORM EN 16602-40-12 Edition: 2013-12-15 Space product assurance Fault tree analysis Adoption notice ECSS/IEC 61025 Raumfahrtproduktsicherung Fehlerbaumanalyse Adoption notice ECSS/IEC 61025 Assurance

More information

MARKING CODES FOR RESISTORS AND CAPACITORS (IEC 60062:2004) IRISH STANDARD I.S. EN 60062:2005. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann

MARKING CODES FOR RESISTORS AND CAPACITORS (IEC 60062:2004) IRISH STANDARD I.S. EN 60062:2005. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann IRISH STANDARD I.S. EN 60062:2005 ICS 31.020 National Standards Authority of Ireland Glasnevin, Dublin 9 Ireland Tel: +353 1 807 3800 Fax: +353 1 807 3838 http://www.nsai.ie MARKING CODES FOR RESISTORS

More information

Joint Interpretation Library

Joint Interpretation Library for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0

More information

Protection Profile for UK Dual-Interface Authentication Card

Protection Profile for UK Dual-Interface Authentication Card Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation

More information

English version. Specifications for a Web Accessibility Conformity Assessment Scheme and a Web Accessibility Quality Mark

English version. Specifications for a Web Accessibility Conformity Assessment Scheme and a Web Accessibility Quality Mark CEN WORKSHOP CWA 15554 June 2006 AGREEMENT ICS 35.240.99 English version Specifications for a Web Accessibility Conformity Assessment Scheme and a Web Accessibility Quality Mark This CEN Workshop Agreement

More information

How To Understand And Understand The Certificate Authority (Ca)

How To Understand And Understand The Certificate Authority (Ca) TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,

More information

COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION

COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM ICS 91.060.50 English version EN 12045 June 2000 Shutters and blinds power operated - Safety in use - Measurement of the transmitted force Fermetures,

More information

ONR CEN/TS 16555-5. Innovation management Part 5: Collaboration management (prcen/ts 16555-5:2014) DRAFT ICS 03.100.40; 03.100.50

ONR CEN/TS 16555-5. Innovation management Part 5: Collaboration management (prcen/ts 16555-5:2014) DRAFT ICS 03.100.40; 03.100.50 ICS 03.100.40; 03.100.50 DRAFT ONR CEN/TS 16555-5 Innovation management Part 5: Collaboration management (prcen/ts 16555-5:2014) Innovationsmanagement Teil 5: Partnermanagement (prcen/ts 16555-5:2014)

More information

English Version. Security service providers - Terminology

English Version. Security service providers - Terminology EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM EN 15602 January 2008 ICS 01.040.03; 01.040.13; 03.080.20; 13.310 English Version Security service providers - Terminology Prestataires de services de

More information

DEUTSCHE NORM June 2003. Plastics Determination of flexural properties (ISO 178 : 2001) English version of DIN EN ISO 178

DEUTSCHE NORM June 2003. Plastics Determination of flexural properties (ISO 178 : 2001) English version of DIN EN ISO 178 DEUTSCHE NORM June 2003 Plastics Determination of flexural properties (ISO 178 : 2001) English version of DIN EN ISO 178 { EN ISO 178 ICS 83.080.01 Kunststoffe Bestimmung der Biegeeigenschaften (ISO 178

More information

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)

Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen

More information

Smartcard IC Platform Protection Profile

Smartcard IC Platform Protection Profile Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

English version. Manual for Determination of Combined Heat and Power (CHP)

English version. Manual for Determination of Combined Heat and Power (CHP) CEN/CENELEC WORKSHOP CWA 45547 September 2004 AGREEMENT ICS 27.100 English version Manual for Determination of Combined Heat and Power (CHP) This CEN/CENELEC Workshop Agreement has been drafted and approved

More information

DEUTSCHE NORM February 2004 DIN EN ISO 18265 {

DEUTSCHE NORM February 2004 DIN EN ISO 18265 { DEUTSCHE NORM February 2004 DIN EN ISO 18265 { ICS 77.040.10 Supersedes DIN 50150, October 2000 edition. Metallic materials Conversion of hardness values (ISO 18265 : 2003) English version of DIN EN ISO

More information

ÖNORM EN 1643. Valve proving systems for automatic shut-off valves for gas burners and gas appliances

ÖNORM EN 1643. Valve proving systems for automatic shut-off valves for gas burners and gas appliances ÖNORM EN 1643 Edition: 2001-01-01 Standards groups H and M Identical (IDT) with ICS 23.060.20 Valve proving systems for automatic shut-off valves for gas burners and gas appliances Ventilüberwachungssysteme

More information

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION

More information

AEROSPACE SERIES - QUALIFICATION AND APPROVAL OF PERSONNEL FOR NON-DESTRUCTIVE TESTING IRISH STANDARD I.S. EN 4179:2006.

AEROSPACE SERIES - QUALIFICATION AND APPROVAL OF PERSONNEL FOR NON-DESTRUCTIVE TESTING IRISH STANDARD I.S. EN 4179:2006. IRISH STANDARD I.S. EN 4179:2006 ICS 49.020 National Standards Authority of Ireland Glasnevin, Dublin 9 Ireland AEROSPACE SERIES - QUALIFICATION AND APPROVAL OF PERSONNEL FOR Tel: +353 1 807 3800 Fax:

More information

Courtesy Translation

Courtesy Translation Direction centrale de la sécurité des systèmes d information Protection Profile Electronic Signature Creation Application Date : July 17th, 2008 Reference : Version : 1.6 Courtesy Translation Courtesy

More information

ETSI TS 102 176-2 V1.2.1 (2005-07)

ETSI TS 102 176-2 V1.2.1 (2005-07) TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms

More information

HYGROTHERMAL PERFORMANCE OF

HYGROTHERMAL PERFORMANCE OF IRISH STANDARD I.S. EN ISO 15927-5:2005 ICS 07.060 91.120.10 HYGROTHERMAL PERFORMANCE OF BUILDINGS - CALCULATION AND PRESENTATION OF CLIMATIC DATA - PART National Standards Authority of Ireland Glasnevin,

More information

Common Criteria Protection Profile. Electronic Identity Card (ID_Card PP) BSI-CC-PP-0061. Approved by the Federal Ministry of Interior. Version 1.

Common Criteria Protection Profile. Electronic Identity Card (ID_Card PP) BSI-CC-PP-0061. Approved by the Federal Ministry of Interior. Version 1. Common Criteria Protection Profile Approved by the Federal Ministry of Interior Version 1.03, 1 Common Criteria Protection Profile Version 1.03, Foreword This Protection Profile is issued by Bundesamt

More information

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems October 12, 2004 It is a frequently asked question if

More information

Information supplied by the manufacturer with medical devices

Information supplied by the manufacturer with medical devices Irish Standard I.S. EN 1041:2008 Information supplied by the manufacturer with medical devices NSAI 2008 No copying without NSAI permission except as permitted by copyright law. I.S. EN 1041:2008 Incorporating

More information

Secure Signature Creation Devices (SSCDs)

Secure Signature Creation Devices (SSCDs) Secure Signature Creation Devices (SSCDs) from different approaches Dr. István Zsolt BERTA istvan.berta@microsec.hu Microsec Ltd. Requirements for SSCDs Annex III of the e-signature Directive, in plain

More information

ONR CEN/TS 16555-3. Innovation management Part 3: Innovation thinking (prcen/ts 16555-3:2014) DRAFT ICS 03.100.40; 03.100.50

ONR CEN/TS 16555-3. Innovation management Part 3: Innovation thinking (prcen/ts 16555-3:2014) DRAFT ICS 03.100.40; 03.100.50 ICS 03.100.40; 03.100.50 DRAFT ONR CEN/TS 16555-3 Innovation management Part 3: Innovation thinking (prcen/ts 16555-3:2014) Innovationsmanagement Teil 3: Integriertes Design-Management (prcen/ts 16555-3:2014)

More information

DRAFT ÖNORM EN ISO 11986

DRAFT ÖNORM EN ISO 11986 DRAFT ÖNORM EN ISO 11986 Edition: 2009-10-01 Ophthalmic optics Contact lenses and contact lens care products Determination of preservative uptake and release (ISO/DIS 11986:2009) Augenoptik Kontaktlinsen

More information

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea hjlee@dongseo.ac.kr

More information

Outdoor furniture Seating and tables for camping, domestic and contract use

Outdoor furniture Seating and tables for camping, domestic and contract use BRITISH STANDARD BS EN 581-1:2006 Outdoor furniture Seating and tables for camping, domestic and contract use Part 1: General safety requirements The European Standard EN 581-1:2006 has the status of a

More information

Conformity assessment Requirements for bodies providing audit and certification of management systems

Conformity assessment Requirements for bodies providing audit and certification of management systems BRITISH STANDARD Conformity assessment Requirements for bodies providing audit and certification of management systems The European Standard has the status of a British Standard ICS 03.120.20 BS EN ISO/IEC

More information

Merchants and Trade - Act No 28/2001 on electronic signatures

Merchants and Trade - Act No 28/2001 on electronic signatures This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and

More information

AGENDA ITEM 15-16 : ELECTRONIC SIGNATURE

AGENDA ITEM 15-16 : ELECTRONIC SIGNATURE SCREENING CHAPTER 10 Country Session: 13- Content Legislation Main Points of Turkish Electronic Signature Legislation Electronic Certificate Service Providers and Market Standardization Aspect of Electronic

More information

Security IC Platform Protection Profile

Security IC Platform Protection Profile Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified

More information

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures, TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp

More information

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013 Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines

More information

Common Criteria Evaluations for the Biometrics Industry

Common Criteria Evaluations for the Biometrics Industry Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common

More information

ETSI TS 102 640-3 V2.1.2 (2011-09)

ETSI TS 102 640-3 V2.1.2 (2011-09) TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01

Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01 VERSION 2.50 (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01 Approved by the Federal Ministry of Health Version 2.50, 2 nd January 2008 Version 2.50, 2nd January 2008 this page was

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1 Zentrum für sichere Informationstechnologie Austria Secure Information Technology Center Austria A-1030 Wien, Seidlgasse 22 / 9 Tel.: (+43 1) 503 19 63 0 Fax: (+43 1) 503 19 63 66 A-8010 Graz, Inffeldgasse

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

LEGIC advant Series. LEGIC card-in-card AFS4096-JP12 V1.2. Security Target Lite. Common Critera ISO 15408 EAL4+

LEGIC advant Series. LEGIC card-in-card AFS4096-JP12 V1.2. Security Target Lite. Common Critera ISO 15408 EAL4+ LEGIC advant Series Security Target Lite LEGIC card-in-card AFS4096-JP12 V1.2 Common Critera ISO 15408 EAL4+ Classification: Public Document No.: LA-23-615a-en / BSI-DSZ-CC-0812 Edition: 6.2012 www.legic.com

More information

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)

More information

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CERTIFIED SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CONTENT CC IN A NUTSHELL CC BACKGROUND AIM AND GOAL OF CC ADVANTAGES OF CC WHY DO WE RECOMMEND CC TO DEVELOPERS? WHEN IS CC THE RIGHT CHOICE?

More information

Qualified mobile electronic signatures: Possible, but worth a try?

Qualified mobile electronic signatures: Possible, but worth a try? Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)

More information

TTP.NL Guidance ETSI TS 101 456

TTP.NL Guidance ETSI TS 101 456 ECP.NL TTP.NL on ETSI TS 101 456 Project TTP.NL on ETSI TS 101 456 30 May 2002 ECP.NL, CCvD-TTP.NL TTP.NL on ETSI TS 101 456 Table of Contents Table of Contents... 2 Foreword... 3 1 Scope... 4 2 References...

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

FASTENERS - ACCEPTANCE INSPECTION (ISO 3269:2000) IRISH STANDARD I.S. EN ISO 3269:2000. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann

FASTENERS - ACCEPTANCE INSPECTION (ISO 3269:2000) IRISH STANDARD I.S. EN ISO 3269:2000. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann IRISH STANDARD I.S. EN ISO 3269:2000 ICS 21.060.01 National Standards Authority of Ireland Dublin 9 Ireland Tel: (01) 807 3800 Tel: (01) 807 3838 FASTENERS - ACCEPTANCE INSPECTION (ISO 3269:2000) NSAI

More information

COURTESY TRANSLATION

COURTESY TRANSLATION PREMIER MINISTRE Secrétariat général de la défense nationale Paris, 7 April 2003 872 /SGDN/DCSSI/SDR Reference : SIG/P/01.1 Direction centrale de la sécurité des systèmes d information PROCEDURE CERTIFICATION

More information

This document is a preview generated by EVS

This document is a preview generated by EVS EESTI STANDARD EVS-EN 10226-1:2004 Pipe threads where pressure tight joints are made on the threads - Part 1 : Taper external threads and parallel internal threads - Dimensions, tolerances and designation

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

WINDOWS AND DOORS - WATERTIGHTNESS - TEST METHOD IRISH STANDARD I.S. EN 1027:2000. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann

WINDOWS AND DOORS - WATERTIGHTNESS - TEST METHOD IRISH STANDARD I.S. EN 1027:2000. Price Code. Údarás um Chaighdeáin Náisiúnta na héireann IRISH STANDARD I.S. EN 1027:2000 ICS 91.060.50 National Standards Authority of Ireland Dublin 9 Ireland Tel: (01) 807 3800 Tel: (01) 807 3838 WINDOWS AND DOORS - WATERTIGHTNESS - TEST METHOD NSAI 2000

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version

More information

CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.

CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd. CERTIFICATE HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office

More information

MEASUREMENT OF FLUID FLOW BY MEANS OF PRESSURE DIFFERENTIAL DEVICES INSERTED IN CIRCULAR CROSS-SECTION CONDUITS RUNNING FULL - PART 1:

MEASUREMENT OF FLUID FLOW BY MEANS OF PRESSURE DIFFERENTIAL DEVICES INSERTED IN CIRCULAR CROSS-SECTION CONDUITS RUNNING FULL - PART 1: STANDARD I.S. EN ISO 5167-1:2003 ICS 17.120.10 MEASUREMENT OF FLUID FLOW BY MEANS OF PRESSURE DIFFERENTIAL DEVICES National Standards Authority of Ireland Dublin 9 Ireland Tel: (01) 807 3800 Tel: (01)

More information

Common Criteria Protection Profile

Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.01, 22th July 2014 Foreword This Protection Profile Electronic Passport using Standard Inspection procedure

More information

EN ISO 10993-1. Biological evaluation of medical devices. Part 1: Evaluation and testing within a risk management process

EN ISO 10993-1. Biological evaluation of medical devices. Part 1: Evaluation and testing within a risk management process ÖNORM EN ISO 10993-1 Edition: 2011-03-15 Biological evaluation of medical devices Part 1: Evaluation and testing within a risk management process (consolidated version) Biologische Beurteilung von Medizinprodukten

More information

EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG

EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG WORKSHOP CWA 14167-2 AGREEMENT March 2002 ICS 03.120.20; 35.040 Dit document mag slechts op een

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

TELECOMMUNICATION NETWORKS

TELECOMMUNICATION NETWORKS THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS

More information

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) 1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

E-Identification and Authentication practices for ehealth in the EU Member States

E-Identification and Authentication practices for ehealth in the EU Member States E-Identification and Authentication practices for in the EU Member States Ref. Ares(2012)1260755-24/10/2012 e-card with Other e - Identification mean with Austria YES National YES YES Belgium YES National

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

FEDERATION EUROPEENNE DE LA MANUTENTION Product Group. industrial trucks. A brief guide for identification of noncompliant. - Exhaust Emission -

FEDERATION EUROPEENNE DE LA MANUTENTION Product Group. industrial trucks. A brief guide for identification of noncompliant. - Exhaust Emission - FEDERATION EUROPEENNE DE LA MANUTENTION Product Group Industrial Trucks FEM A brief guide for identification of noncompliant industrial trucks 11.2010 (E) - Exhaust Emission - I n d e x 1 Introduction...

More information

ARE YOU A EUROPEAN CITIZEN LIVING IN BELGIUM? Come and vote for the European Parliament on 25 May 2014!

ARE YOU A EUROPEAN CITIZEN LIVING IN BELGIUM? Come and vote for the European Parliament on 25 May 2014! ARE YOU A EUROPEAN CITIZEN LIVING IN BELGIUM? Come and vote for the European Parliament on 25 May 2014! 1 WHO IS ENTITLED TO VOTE ON 25 MAY 2014? In order to take part in this election as a European citizen,

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

International Compliance

International Compliance YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International

More information

ETSI EN 319 401 V1.1.1 (2013-01)

ETSI EN 319 401 V1.1.1 (2013-01) EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1

More information

The Legal Classification of Identity-Based Signatures

The Legal Classification of Identity-Based Signatures The Legal Classification of Identity-Based Signatures Christoph Sorge University of Paderborn 33098 Paderborn, Germany christoph.sorge@uni-paderborn.de Abstract Identity-based cryptography has attracted

More information

General requirements for bodies operating assessment and certificationlregistration of quality systems (ISOIIEC Guide 6ZA996)

General requirements for bodies operating assessment and certificationlregistration of quality systems (ISOIIEC Guide 6ZA996) Edition: 1998-05-01 ldentical (IDT) with ÖVE EN 4501 2: I998 ISOIIEC 62 Guide: 1996 Supersedes ÖNORM EN 4501 2: 1990-06-08 ÖNORM EN 45012 Bbl 1:1990 08 ICS 03.1 20.20 General requirements for bodies operating

More information

Certification Report

Certification Report Certification Report EAL 4+ (AVA_VAN.5) Evaluation of ID&Trust Ltd. HTCNS Applet v1.03 issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.01/TSE-CCCS-29

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Security Confirmation and Report T-Systems.02192.TE.08.2007 SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Siemens AG Confirmation concerning Products for Qualified

More information