Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September Version 1.
|
|
|
- Jessica Lorena Morgan
- 9 years ago
- Views:
Transcription
1 Supporting Document Guidance ETR template for composite evaluation of Smart Cards and similar devices September 2007 Version 1.0 Revision 1 CCDB
2 Foreword This is a supporting document, intended to complement the Common Criteria version 2 and 3 and the associated Common Evaluation Methodology for Information Technology Security Evaluation and should be used in conjunction with the supporting document on Composite product evaluation for Smartcards and similar devices. Supporting documents may be Guidance Documents, that highlight specific approaches and application of the standard to areas where no mutual recognition of its application is required, and as such, are not of normative nature, or Mandatory Technical Documents, whose application is mandatory for evaluations whose scope is covered by that of the supporting document. The usage of the latter class is not only mandatory, but certificates issued as a result of their application are recognized under the CCRA. Technical Editor: NLNCSA Document History: V1.0, September 2007 : Initial release. General purpose: The security properties of both hardware and software products can be certified in accordance with CC. To have a common understanding and to ensure that CC is used for hardware integrated circuits in a manner consistent with today s state of the art hardware evaluations, the following chapters provide guidance on the individual aspects of the CC assurance work packages in addition to the Common Evaluation Methodology [CEM]. Field of special use: Smart cards and similar devices
3 Acknowledgments: The governmental organisations listed below and organised within the Joint Interpretation Working Group contributed to the development of this version of this Common Criteria Supporting document. France: Direction Centrale de la Sécurité des Systèmes d'information Germany: Bundesamt für Sicherheit in der Informationstechnik Netherlands: Netherlands National Communications Security Agency Spain: Ministerio de Administraciones Públicas and Centro Criptológico Nacional United Kingdom: Communications-Electronics Security Group(CESG) They also acknowledge the contribution of the work done by several smart card vendors, evaluation labs, and other companies organised within: - eeurope Trailblazer3 - International Security Certification Initiative (ISCI)
4 LOGO <NAME OF ITSEF COMPANY> <Name product> TEMPLATE Product Developer Sponsor Certification Body Certificate reference Evaluation facility Evaluator(s) <Name product> Developer Sponsor Reference/version Date <Reference and version of the document> <Date of the document> ETR_COMP Template version 1.0 September 2007
5 Document information Document and project identification Name Document title Reference/version CC version Evaluation level Developer Sponsor Certification Body Certificate reference Evaluation facility Value Version history Version Date Nature of modification Page Edition <Name of the document writers> Approval <Name and title of the approver, date of approval, visa> Diffusion <Diffusion list> - Certification body - Sponsor - Developper - Observer Confidentiality and copyright notice <Any specific mention to confidentiality rules and copyright notice> Page 5 / 22
6 Table of contents 1. Introduction Objective of the document Product identification Evaluation results and certification summary Contact Evaluator Sponsor and developer Certification BodyCertification Body Platform Design General conception Description of TOE structure Evaluated configuration TOE limits TOE configuration TOE identification TOE installation, generation and start-up procedures Delivery procedure and data exchange Introduction Identification of the delivery phase Deliveries between TOE manufacturer and embedded software developer Delivery from the TOE Manufacturer to the Card Manufacturer Penetration testing Introduction <Attack scenario Id of attack scenario, e.g. AS-X, or DPA_DES> <Iteration of attack scenarios> Summary Observations and recommendations Observation Recommendation Annex 1. References about the evaluated product Annex 2. Methods and standards for certification Page 6 / 22
7 2 Introduction 2.1 Objective of the document The standard Evaluation Technical Report [ETR] contains proprietary information that cannot be made public. This document compiled from the [ETR] in order to provide sufficient information for composite evaluation with the certified TOE <Name product>. It contains information from the TOE evaluation needed for composite evaluation and should enable the reader to understand the threats and the effectiveness of countermeasures. This document was written according to the referenced document [COMP]. The targeted audience are ITSEF that conduct composite evaluation based on <Name product>. 2.2 Product identification The evaluated revision of the product is : <Name product>. <Add any useful detail to the product main reference, in order to provide all necessary information to identify clearly the product during the composite evaluation: Identification of the hardware part; Identification of all software libraries included Identification of possible software platform included>. These references are provided with the following rules: <Describe the manufacturer rules to understand the references given: commercial reference, technical reference: possible software platform reference, software libraries references, hardware part references (reference of each mask set, identification of the production site), identification of the complete configuration list [CONF] etc>. The way to check the revision of the product is described in chapter 4.3. The list of guidance to use with the product in its certified configuration is given in Annex 1 ([AGD-X]). 2.3 Evaluation results and certification summary The content given in this report is a result of the product <Name product> evaluation as specified in the <Name product> security target [ST]. <Add possible comments and history about re-evaluation and referenced of the previous certified product, previous ETR and task re-use> The evaluation tasks have been performed in compliance to Common Criteria [CC] and its methodology [CEM] at level EAL4/5 augmented. The following table details the selected EAL4/5 augmentations: < According to the CC version used,add one of the following tables > Page 7 / 22
8 Assurance component EAL4 Methodically designed, tested, and reviewed EAL5 Semi formally designed and tested + ADV_IMP.2 Implementation of the TSF +AD_FSP.3 Semiformal functional specification + ALC_DVS.2 Sufficiency of security measures +ALC_FLR.3 Systematic flaw remediation +AVA_CCA.1 Covert Channel Analysis +AVA_MSU.3 Analysis and testing for insecure state + AVA_VLA.4 Highly resistant Table 1 Assurance component for CC V2.3 evaluation Assurance component EAL4 Methodically designed, tested, and reviewed EAL5 Semi formally designed and tested + ALC_DVS.2 Sufficiency of security measures + AVA_VAN.5 Advanced methodical vulnerability Analysis Table 2 - Assurance component for CC V3.1 evaluation <For the assurance components higher than EAL4 level, the evaluators have used <proprietary methods validated by the evaluation authorities >>. The evaluation has been performed also with the help of the following Common Criteria supporting document: - The Application of CC to Integrated Circuits (cf. [CC IC]), - Application of attack potential to smart-cards (cf. [CC AP]), - <other evaluation authority specific document>. The product was certified by the <identification of the certification body> under the reference <reference of the certification report> (cf. [CERTIF]), on the <date of certification>. The product shall be used with its guidance identified in Annex 1 under the reference [AGD- X]. The delivery procedures of the Platform Developer identified under the reference [DEL] and detailed in chapter 5 shall be followed by the Application Developer. 2.4 Contact Evaluator <Possible introduction to the evaluator, with reference to the accreditation and/or licensing number from the scheme> Page 8 / 22
9 2.4.2 Sponsor and developer <Possible introduction to the sponsor and developer, with address and contact for product and certification information> Certification BodyCertification Body <Possible introduction to Certification Body, with address and contact for certification information> Page 9 / 22
10 3 Platform Design 3.1 General conception The product is a <single chip micro-controller unit / microcontroller with software platform> designed by Developer and built in 0.XXµm <detail on the type of technology can be provided>. The main features of the product are described in the following picture: <EXAMPLE> Scrambling key fuses Charge pump User ROM User EEPROM & OTP User RAM AdvX RAM Test structure s Crypto ROM library Interrupt controller CLK RST Charge pump osc. VFO Clock generator Reset controller Memories & peripherals firewall CPU Crypto Coprocessor ISO7816 controller ISO port 0 ISO port 1 ISO14443 controller RF modulator Power and clock I/O 1 I/O 0 RF1 RF2 VDD SPA/DPA repression Security & control logic Watchdog DES/TDES controller RNG GND Voltage regulator Power management Timers CRC-32 controller Checksum accelerator Figure 1 Secure microcontroller The product is build with - A Hardware part: An X-bit processing unit; Memories: EEPROM (<techno and size, possible integrated mechanism>, for program and data storage), ROM (<size for user>, <size for dedicated software: Autotest, cryptographic libraries,>) and RAM (<techno and size, possible integrated mechanism>); Security Modules: Memory Access Control Logic, clock generator, security administrator, power management, memories integrity control ; Functional Modules: 8-bits timers, I/O management in contact mode (ISO 7816) and contactless mode (ISO 14443), True Random Number Generators, DES and RSA co-processing units... Page 10 / 22
11 - A dedicated software embedded in ROM which comprises: Microcontroller test capabilities; System and Hardware/Software interface management capabilities; ISO interface management capabilities; Cryptographic libraries: T-DES, AES and RSA, SHA2,.. The smartcard embedded software is not part of the evaluation. </EXAMPLE> 3.2 Description of TOE structure <This part is dependant on the developer approach to describe HLD level. This chapter shall contain a list of the product subsystem as required in the [COMP] document>. <EXAMPLE> Subsystem Security mechanism SS14 SPA/DPA countermeasures M.15 Hardware DES/TDES Rely on : Feature Design Description, remarks Clock generation, with countermeasures like jitter, cycle stealing. These mechanisms have to be activated by the embedded software Hardware DES co-processor. Cannot be changed because completely part of the glue logic Table 3 Architectural design Legend: - Subsystem: reference to the HLD/TDS subsystem, or security mechanism, - Security mechanism: title of the security mechanism [can be merged with the previous column], - Rely on: to be selected among technology, feature, design, or software library, - Description, remarks: description of the security mechanism, and the protection provided to counter threat or part of threat. </EXAMPLE> Page 11 / 22
12 4 Evaluated configuration 4.1 TOE limits The evaluated product is identified in chapter 2.2. The reference to the configuration list is provided in Annex 1, under the reference [CONF]. <add any information that provided more details on the configuration list, if required> <Describe the physical and logical limits of the product> <EXAMPLE> The <hardware> platform aims to host one or several software applications and can be embedded in a plastic support to create a Smartcard with multiple possible usages (banking, health card, pay-tv or transport applications ) depending on the Embedded Software applications. However, only the <hardware> platform <and the identified software libraries> is<are> covered by the evaluation. Some commands of the software libraries <identification of the library> were not evaluated: <list of command> The embedded software shall not use it in order to remain in the certified configuration of the IC. The embedded software applications are not in the scope of this evaluation. </EXAMPLE> 4.2 TOE configuration <Describe the possible configuration of the product, and identify among them which one have been covered by the evaluation> <EXAMPLE> The product can be in one of these possible configurations: - Test configuration: TOE configuration at the end of developer IC manufacturing. The TOE is tested with a part of the Dedicated Software (called XXX ) within the secure developer premises. Pre-personalization data can be loaded in the EEPROM. The TOE configuration is changed to <intermediate> before delivery to the next user, and the part cannot be reversed to the test configuration. - <intermediate> configuration: TOE configuration when delivered to users involved in IC packaging and personalization. Limited tests are still possible with the Dedicated Software (System Rom operating system). Personalization data can be loaded in the EEPROM. The TOE configuration is changed to its final User configuration when delivered to the end user (the part cannot be reversed to the configuration). - User configuration: Final TOE configuration. The developer test functionalities are unavailable. The Dedicated Software only provides the power-on reset sequence and routine libraries (mainly cryptographic services). After the power-on reset sequence, the TOE functionality is driven exclusively by the Embedded Software. - <Others such as I/O interfaces, memory sizes, additional libraries, protocol.> Page 12 / 22
13 All configurations were evaluated (the last two configurations, i.e. <intermediate> and User, are those of the TOE in the user environment). </EXAMPLE> 4.3 TOE identification <Describe the way to identify the microcontroller and its software libraries during composite evaluation. This has to be written in consistencies with chapter 2.2> <EXAMPLE> The following marks are physically printed (i.e. always visible) on the chip surface: - IC identification : <reference printed> - dedicated software (<tests software, crypto libraries, other libraries>) identification : <reference printed> - embedded software (in this case <name of the software embedded for evaluation needs>) identification : <reference printed> - manufacturing site identification : <reference printed and meaning> Device identification can also be performed using <specific register or memory content or command>, which content<or answer> should be hexadecimal "0xXX" (see [AGD-X], section XXX). Silicon revision can also be checked using <specific register or memory content or command>, which content <or answer> should be hexadecimal "0xYY" (see [AGD-X], section XXX). Software library <identification of the library> can be checked using <specific command>, which answer should be hexadecimal 0xXXYY (see [AGD-X], section XXX). <repeat for all library or software part> </EXAMPLE> 4.4 TOE installation, generation and start-up procedures <If applicable for the Platform security relevant generation or installation parameter settings should be explained and their effects on the defence of attacks be outlined (e.g key length, counters limits)> <EXAMPLE> Installation/generation/start up (IGS) operations are those needed to be performed by customers (i.e. users outside the developer s environment) to proceed the TOE (in our case an IC) from the realization of its implementation (i.e. at the end of wafer fabrication) to its customer configuration (i.e. ready to be used: TOE in <precise the different mode like intermediate and/or user > configurations). For the specific case of a smartcard IC, these operations correspond to those modifying the IC functionality and configuration. For instance: - Personalization operations, - Configuration changes. For the <Name product> which was evaluated in open mode (i.e. without any specific embedded application), there is no personalization operation. Page 13 / 22
14 As for the test to < intermediate or user > configuration change, it is performed only by the Developer, and is part of the developer manufacturing operations. After delivery the TOE only features one fixed configuration ( user mode), which cannot be altered by the user. In conclusion, there is no customer IGS procedure. </EXAMPLE> Page 14 / 22
15 5 Delivery procedure and data exchange 5.1 Introduction As per the evaluation guide The application of CC to IC (cf. [CC IC]), the deliveries under consideration are: 1. The delivery of the embedded application code to the microcontroller manufacturer, 2. The delivery of information required by the mask manufacturer, 3. The delivery of the mask to the microcontroller manufacturer, 4. The delivery of the microcontroller to the entity in charge of the next step (testing, embedding into micro-module, card manufacturing). For the composite evaluation, the description of phase 1 and 4 are needed and will be detailed in this document. We should add also the delivery of the IC dedicated software and guidance to the application developer, and also identify the detail of fab-key protection mechanism. 5.2 Identification of the delivery phase The product life cycle is the following: <EXAMPLE> Company Address Function WWW Libraries development XXX IC design (code entry) YYY IC mask prep ZZZ Mask manufacturing AAA IC manufacturing Table 4 Identification of deliveries </EXAMPLE> All sites were evaluated. The environmental CC requirements (ACM, ALC, ADO) are fulfilled. 5.3 Deliveries between TOE manufacturer and embedded software developer. <Identification of the entry point, and description of the process for delivering any sensitive information (dedicated software, embedded software, data, documentation, tools ) Identification of any form, procedure [DEL], tools and process for integrity checks; Identification of deliverable> 5.4 Delivery from the TOE Manufacturer to the Card Manufacturer <Identification of the packaging of the product (wafer sawn or unsawn, module). Entry point identification. Description of the process for delivering the IC and its documentation to the card manufacturer. Identification of any form, procedure [DEL], tools and process for integrity checks (documentation, fab-key); Page 15 / 22
16 Identification of deliverable [AGD-X], IC, Fab-Key> Page 16 / 22
17 6 Penetration testing 6.1 Introduction The independent vulnerability analysis has been performed according to [CC] and [other methods required by the evaluation authority]. The ratings have been calculated according to Application of attack potential to smart-cards document (see [CC AP]). This chapter presents the list of attack scenarios that have been considered. The presentation of the different attack scenarios follows the examples given in the [CC AP]. The following descriptions should provide sufficient details to reproduce attacks which require countermeasures in the composite TOE. [If a category of attack scenario is not investigated, justification shall be provided: why no tests were performed? Each attack scenario shall follow the following structure: <Attack scenario Id of attack scenario, e.g. AS-X, or DPA_DES> Attack step <Method used shall be identified effects obtained shall be described>. Date and history <date of the test performed. When the ETR is updated following surveillance period or reevaluation, the history of testing activities shall be detailed: new analysis, evolution of the state of the art, new test or enhancement of test shall be detailed>. CC parameters involved CC parameters Values Security mechanism Security function SFR Objectives Assets* *For an IC or platform evaluation, the assets can be generic one (as identified in the security target), e.g.: source code of possible embedded application, possible embedded application secret keys or confidential data loaded in memory, or services provided by the platform (RNG, firewall) that can be broken. Information on attack potential <Description of the attack, and discussion with details for each of the following parameters (see [CC AP]): 1. Elapsed time 2. Expertise 3. Knowledge of the TOE 4. Access to the TOE Page 17 / 22
18 5. Equipment 6. Open samples < In the case where a test performed on the platform indicates a possible attack path for which countermeasures must be implemented by the composite product, the technical information shall provide sufficient information for the composite evaluator to set up a similar attack path in order to validate the robustness of the countermeasures. This information shall include the general outline and idea of the attack and any technical detail specific to the TOE that proved important for performing the attack. Also included should be any observation from the testing activity that could highlight critical points for the composite evaluator.> Rating Factor Ident n Exploit n Elapsed Time Expertise Knowledge of TOE Access to TOE Open Samples / Known Key Equipment Sub Totals Totals <If there is no rating, provide a justification. If the rating is over 31 provide it. If the attack scenario is not feasible as far as some specific software countermeasure are applied, they shall be identified (e.g. see countermeasure XXX described in guidance [AGD- X], chapter Y.Z). >] 6.2 <Iteration of attack scenarios> [For list of attacks, refer to the last version of Attack method for smartcards and related products. This list shall be considered as a minimum] <Describe all attack following for each the model given 6.1.1>. 6.3 Summary <Provide a table, listing vulnerabilities, associated attack scenario and assets involved, with a status> <EXAMPLE > The following table sums up penetration testing that have been performed, and their results: Vulnerabilities Attack scenarios Assets involved Status Guidance Physical Attacks Reading the AS-03, <or Content of ROM (Embedded OK content of the ROM READ_ROM, or> software) Physical AS-07, <or IC design OK Obvservation REVERS, or> Overcoming sensors and filters Page 18 / 22
19 Vulnerabilities Attack scenarios Assets involved Status Guidance Perturbation Attacks EEPROM perturbation Leakage information NA NA READ_EE, <or AS-04, or> MODIF_EE, <or> Confidentiality of data in OK-S EEPROM Integrity of data in EEPROM OK Retrieving keys with DFA SPA/DPA Non-invasive retrieving of secret data SPA/DPA_DES, Any key involved in DES OK-H <or> calculation SPA/DPA_RSA, Any key involved in RSA OK-H or calculation SPA/DPA_AES, Any key involved in AES OK-S or calculation Higher Order DPA EMA Attacks Exploitation of Test features Attacks on RNG Ill-formed Java Card applications Software Attacks <Others> Table 5 penetration tests Legend: OK : Ok without any countermeasure OK-H : Ok with hardware countermeasure (gives precise reference to the guidance) OK-S : Ok with additional software countermeasures (gives precise reference to the guidance). See [AGD-X], Y.Z See [AGD-X], X.Z See [AGD-X], Y.Z See [AGD-X], Y.Z See [AGD-Y], A.B Page 19 / 22
20 7 Observations and recommendations <The goal of this chapter is no to repeat the guidance recommendation, but to outline sensitive aspects that should be analysed carefully. Provide any additional required information for a secure usage, or any additional information required for composite evaluation (see [COMP], 5.3.6)> 7.1 Observation <EXAMPLE> The evaluated TOE is the silicon chip with its Dedicated Software. The TOE submitted to evaluation does not comprise any specific application: there is no applicative ROM-embedded Software. However the ROM of the evaluation samples contains an operating system that allows the evaluators to use a set of commands with the I/O, and to load in EEPROM (or in RAM) test software. This software is not evaluated: it is out of the evaluation perimeter (i.e. no vulnerability analysis is performed on it). The TOE is a "generic" device, i.e. a chip without any ROM embedded software. Testing was thus performed on such "generic" devices executing evaluator test software loaded in EEPROM or in RAM: no testing was performed with ROM softwares, except of course the provided cryptographic libraries (which are in ROM). The assumptions for the users phases of the product described in the Security target shall be satisfied. </EXAMPLE> 7.2 Recommendation <EXAMPLE> The assumptions for the different phases of the product described in the Security target shall be checked in the context of composition. From the last observation arises a recommendation for specific testing during a composition evaluation : SPA and DFA vulnerability analysis on ROM embedded software (apart from the cryptographic libraries) shall be performed by the composition ITSEF as this issue could not be fully assessed by the evaluation on "generic" devices. Penetration testing outlined vulnerabilities typical of silicon devices (particularly EEPROM and RAM sensitivity to pulsed light). They are correctly countered if the software developer complies with the security recommendations provided by the IC developer. Thus the composition ITSEF shall check that at the very least these Developer recommendations are fully taken into account (cf. [AGD-X] countermeasure, particularly the one identified in Table #). </EXAMPLE> Page 20 / 22
21 Annex 1. References about the evaluated product [AGD-1] [AGD-2] [CERTIF] [CONF] [DEL] [ETR] [ST] [ST-Lite] Page 21 / 22
22 Annex 2. Methods and standards for certification <National regulation applicable for IT certification> [CC] * Common Criteria for Information Technology Security Evaluation : Part 1: Introduction and general model, August 2005, version 2.3, ref CCMB ; Part 2: Security functional requirements, August 2005, version 2.3, ref CCMB ; Part 3: Security assurance requirements, August 2005, version 2.3, ref CCMB The content of Common Criteria version 2.3 is identical to the International Standard ISO/IEC 15408:2005 [CEM] * Common Methodology for Information Technology Security Evaluation : Evaluation Methodology, August 2005, version 2.3, ref CCMB The content of CEM version 2.3 is identical to the International Standard ISO/IEC 18045:2005 [CC] * Common Criteria for Information Technology Security Evaluation : Part 1: Introduction and general model, September 2006, version 3.1, ref CCMB ; Part 2: Security functional requirements, September 2006, version 3.1, ref CCMB ; Part 3: Security assurance requirements, September 2006, version 3.1, ref CCMB [CEM] * Common Criteria for Information Technology Security Evaluation : Evaluation Methodology September 2006, version 3.1, ref CCMB [CC IC] [CC AP] [COMP] Common Criteria supporting document - The Application of CC to Integrated Circuits, April 2006, version 2.0, ref. CCDB Common Criteria supporting document - Application of attack potential to smart-cards, April 2007, version 2.3, ref. CCDB Common Criteria supporting document - Composite product evaluation for smart cards and similar devices, September 2007, version 1.0, ref. CCDB * The document should list the appropriate version of the CC used in the evaluation of the TOE Page 22 / 22
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
Joint Interpretation Library. Guidance for smartcard evaluation
Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary
Smartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition
ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice IC and ES composition Version 1.2 March 2002 ETR-lite for Composition Annex A Table of Contents 1. Foreword...
Supporting Document Guidance. Smartcard Evaluation. February 2010. Version 2.0 CCDB-2010-03-001
Supporting Document Guidance Smartcard Evaluation February 2010 Version 2.0 CCDB-2010-03-001 Foreword This is a supporting document, intended to complement the Common Criteria and the Common Evaluation
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Security IC Platform Protection Profile
Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified
Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001
Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s)
NXP Secure Smart Card Controllers Document information Info Content Keywords CC, Security Evaluation,, Functional Requirements, Security Functionality, Assurance Level, P5CC008, P5CC012 V1A/ V1A(s) Abstract
Joint Interpretation Library
Joint Interpretation Library Security Architecture requirements (ADV_ARC) for smart cards and similar devices Document purpose: provide guidance to developers to fulfill the Security Architecture requirements
Security testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
Joint Interpretation Library
Document purpose: provide rules to ensure that CC is used for hardware integrated circuits in a manner consistent with today s state of the art hardware Version 3.0 February 2009 Joint Interpretation Library
Security testing for hardware product : the security evaluations practice
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing for hardware product : the security evaluations practice DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security
Details for the structure and content of the ETR for Site Certification. Version 1.0
Details for the structure and content of the ETR for Site Certification Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 Rev. 1.1 24 October 2011 BSI-DSZ-CC-0707 Evaluation documentation Document information Info Keywords
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
Certification Report. NXP J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3 Sponsor and developer:
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Common Methodology for Information Technology Security Evaluation. Evaluation methodology. September 2012. Version 3.1 Revision 4 CCMB-2012-09-004
Common Methodology for Information Technology Security Evaluation Evaluation methodology September 2012 Version 3.1 Revision 4 CCMB-2012-09-004 Foreword This version of the Common Methodology for Information
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
BSI-DSZ-CC-S-0040-2015. for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH
BSI-DSZ-CC-S-0040-2015 for Dream Chip Technologies GmbH Germany of Dream Chip Technologies GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228
CERTIFICATION REPORT
REF: 2011-11-INF-837 v1 Target: Público Date: 17.04.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-11 KONA 102J1 epassport EAC v1.1 Applicant: KEBTechnology
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Software Modularisation and the Common Criteria
Software Modularisation and the Common Criteria A Smartcard Developer s Perspective Dr. Karsten Klohs Morpho, Riemekestraße 160, 33106 PADERBORN [email protected] Abstract. The Common Criteria (CC)
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
BSI-DSZ-CC-0782-2012. for
BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Courtesy Translation
PREMIER MINISTRE Secretariat General for National Defence French Network and Information Security Agency Certification Report ANSSI-CC-2010/15 OmniPCX Enterprise solution : OmniPCX Enterprise (release
Certification Report
Certification Report EAL 4+ (AVA_VAN.5) Evaluation of ID&Trust Ltd. HTCNS Applet v1.03 issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.01/TSE-CCCS-29
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September 2012. Version 3.
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012 Version 3.1 Revision 4 CCMB-2012-09-003 Foreword This version of the Common Criteria
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
MIFARE DESFire EV1 MF3ICD81
MIFARE DESFire EV1 MF3ICD81 Rev.1.5 10 May 2011 BSI-DSZ-CC-0712 Evaluation Documentation Document information Info Keywords Abstract Content, MF3ICD81 Evaluation of the NXP Secure Smart Card Controller
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2012. Version 3.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2012 Version 3.1 Revision 4 CCMB-2012-09-001 Foreword This version of the Common Criteria
BSI-DSZ-CC-0675-2011. for. NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3. from. NXP Semiconductors Germany GmbH
BSI-DSZ-CC-0675-2011 for NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3 from NXP Semiconductors Germany GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
BSI-DSZ-CC-0889-2013. for. tru/cos tacho v1.1. from. Trueb AG
BSI-DSZ-CC-0889-2013 for tru/cos tacho v1.1 from Trueb AG BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 99 9582-0, Fax +49 (0)228 9582-5477,
C033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
Certification Report BSI-DSZ-CC-0212-2004. for. Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01. from. Renesas Technology Corp.
Certification Report Federal Office for Information Security BSI-DSZ-CC-0212-2004 for Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01 from Renesas Technology Corp. - Bundesamt für Sicherheit
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.
Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager [email protected] Gemplus & Axalto merge into Gemalto 1.7 billion in combined pro-forma
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Guidelines for Developer Documentation
Guidelines for Developer Documentation according to Common Criteria Version 3.1 Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Phone: +49 (0)3018 9582-111
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model August 1999 Version 2.1 CCIMB-99-031 Part 1: Introduction and general model Foreword This version of
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2006. Version 3.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2006 Version 3.1 Revision 1 CCMB-2006-09-001 Foreword This version of the Common Criteria
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
CERTIFICATION REPORT
REF: 2011-12-INF-1089 v1 Target: Expediente Date: 17.12.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-12 POLYMNIE LDS BAC applet Applicant: B340709534
BSI-DSZ-CC-0829-2012. for
BSI-DSZ-CC-0829-2012 for Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific
Developing a new Protection Profile for (U)SIM UICC platforms. ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.
Developing a new Protection Profile for (U)SIM UICC platforms ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.Presty Project Background A Protection Profile for (U)SIM Security Requirements
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5
122-B CERTIFICATION REPORT No. CRP245 Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 Issue 1.0 June 2008 Crown Copyright 2008 Reproduction
Common Criteria v3.1 Vulnerability Assessment: What is new?
Common Criteria v3.1 Vulnerability Assessment: What is new? T-Systems GEI GmbH 25th-27th September, 2007, page 1. Road Map CC Part 3, Class AVA CEM, Class AVA CEM, Annex B 25th-27th September, 2007, page
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
Common Criteria Protection Profile
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.01, 22th July 2014 Foreword This Protection Profile Electronic Passport using Standard Inspection procedure
C013 Certification Report
C013 Certification Report VirtualEye v5.0 File name: Version: v1a Date of document: 8 March 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
LEGIC advant Series. LEGIC card-in-card AFS4096-JP12 V1.2. Security Target Lite. Common Critera ISO 15408 EAL4+
LEGIC advant Series Security Target Lite LEGIC card-in-card AFS4096-JP12 V1.2 Common Critera ISO 15408 EAL4+ Classification: Public Document No.: LA-23-615a-en / BSI-DSZ-CC-0812 Edition: 6.2012 www.legic.com
