On Security Evaluation Testing
|
|
|
- Irene White
- 10 years ago
- Views:
Transcription
1 On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
2 Introduction Motivation Motivation 1 How does an evaluator identify all applicable physical attacks for (commercial) cryptographic products? 2 How does an evaluator conduct penetration testing? 3 How does an evaluator assess the security level of (commercial) cryptographic products? 4 How is a certification process organized? Security Evaluation Schemes Common Criteria: Current Version: 3.1 FIPS 140: Current Version: FIPS 140-2, Draft Version: FIPS Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
3 Outline Introduction Outline 1 Introduction to Security Evaluation Schemes 2 The Common Criteria Approach 1 Penetration Testing for Smartcard ICs 3 The FIPS-140 Approach 1 Penetration Testing for Multiple Chip Cryptographic Modules 4 Conclusion Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
4 Certification Process Introduction Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
5 Introduction Why Certification? Benefits 1 Benefits for Manufacturer: Evidence of compliance to law requirements Consequent assessment of security functions during development Knowledge and minimization of vulnerabilities and risks Improvement of product quality Marketing 2 Benefits for User: Evidence of correct and effective implementation of security functions. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
6 Introduction Comparison of the Common Criteria and the FIPS 140 Approach FIPS 140 The standard has 4 pre-defined Security Levels. Each security level has pre-defined security functions and test requirements for 11 requirement areas (among them: Physical Security, Self Tests, and Mitigation of Other Attacks). Common Criteria The standard provides tool boxes for functional and assurance requirements. Extensions are possible. Manufacturer/Sponsor defines security functions and aimed Evaluation Assurance Level (EAL) of the product (also known as Target of Evaluation (TOE)). Product-specific requirements are set down in a Security Target (ST). Product-class specific requirements are set down in a Protection Profile (PP). Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
7 The Common Criteria Approach History of Security Evaluation Standards Trusted Computer System Evaluation Criteria (TCSEC) or Orange Book (USA, 1983) Information Technology Security Evaluation Criteria (ITSEC) (Europa, 1991) Common Criteria (Standard since 1996, Current Version: 3.1) Mutual International Recognition Agreement (CCRA) for Evaluation Assurance Levels (EALs) 1 through 4. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
8 The Common Criteria Approach Contents and Principles Contents Part 1: General Information. Part 2: Catalogue of Functional Requirements. What are the Security Functions? Part 3: Catalogue of Assurance Requirements. How deeply and rigorous are Security Functions evaluated? Common Criteria Evaluation Methodology (CEM). How shall the evaluator conduct each evaluation task? Principles Impartiality, Objectivity, Repeatability, Reproducibility. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
9 The Common Criteria Approach Common Criteria Evaluation Assurance Level (EAL) Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
10 The Common Criteria Approach Estimation of the Attack Potential (according to CEM) For each in the operational environment exploitable vulnerability the required attack potential is calculated according to the following factors: Elapsed Time (0-19 points), Specialist Expertise (0-8 points), Knowledge of the TOE (0-11 points), Window of opportunity (0-10 points), IT hardware/software or other equipment (0-9 points) Final Assessment TOE is resistant to basic attack potential if all attacks require at least 10 points,... high attack potential if all attacks require at least 25 points. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
11 The Common Criteria Approach Estimation of the Attack Potential (for Smartcard Evaluation) Smartcard Evaluation For smartcard evaluation, a specific JIL document Application of Attack Potential to Smartcards, Version 2.7 applies (see talk of Christophe Giraud). Main differences are Separation in identification and exploitation phase. Window of opportunity counts number of samples needed. Additional category Open samples. Points per category and phase are different. Points needed for certain AVA VAN level are different to CEM, e.g., TOE is resistant to high attack potential if all attacks require at least 31 points. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
12 The Common Criteria Approach Penetration Testing Approach Penetration testing approach considers the claimed security functions in the PP/ST, the identified threats in the PP/ST, and the aimed vulnerability assessment level in the PP/ST. Notes: Only attacks are considered with can be applied in the defined operational environment of the product. If the PP/ST does not include requirements for physical security functions physical attacks are not conducted. The PP/ST author has the option to restrict to specific physical threats. Further restrictions might be made in guidance documents! Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
13 The Common Criteria Approach Penetration Testing for Smartcard ICs Example: Eurosmart Security IC Platform Protection Profile Security IC Platform Protection Profile Version 1.0, : Authors: Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe Ltd, STMicroelectronics. Physical threats are addressed for the end-consumer phase. Minimum assurance level is EAL4 augmented with AVA VAN.5 and ALC DVS.2. Note: this Protection Profile covers only the Security IC, composite evaluations are based upon the evaluation of the Security IC and the evaluation of the embedded Software. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
14 Considered Threats The Common Criteria Approach Penetration Testing for Smartcard ICs Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
15 The Common Criteria Approach Penetration Testing for Smartcard ICs Considered Threats Threat Statement Inherent Information Leakage (e.g., TA, SPA/SEMA, DPA/DEMA,...) Physical Probing (IC failure analysis and IC reverse engineering) Malfunction due to Environmental Stress (e.g., with temperature, glitches, spikes, light,...) Physical Manipulation (IC failure analysis and IC reverse engineering with changes of circuitry) Forced Information Leakage (e.g., FA, DFA, with glitches, spikes, light,...) Abuse of Functionality (e.g., re-activating functionality of test pads) Deficiency of Random Numbers (e.g., by destruction, manipulation, environmental stress.) Main Physical Security Objective is Tamper Resistance. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
16 The Common Criteria Approach Penetration Testing for Smartcard ICs Penetration Testing Approach Dependencies for Vulnerability Testing according AVA VAN.5 Public domain sources (e.g. papers on practical physical attacks) Supporting Documents for the TOE: Security architecture description Complete functional specification Basic modular design Implementation representation of the TOE Security Functions Operational user guidance Preparative procedures Testing: basic design The penetration testing is based on sensitive and even critical information about the TOE (White-box Testing)! Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
17 The Common Criteria Approach Penetration Testing for Smartcard ICs Penetration Testing Approach Tradeoff between Elapsed Time and Knowledge Compensation of time-consuming analysis by Sensitive and even critical knowledge of the TOE. Tradeoff between Elapsed Time and Open Samples Compensation of time-consuming analysis by Use of special TOE samples (e.g., with built-in trigger signals, deactivated countermasures). Support by the Manufacturer Further simplifications for testing are usual (but not well supported in the Common Criteria scheme any longer): Joint penetration testing with manufacturer. Joint analysis of penetration testing results with manufacturer. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
18 The Common Criteria Approach Penetration Testing for Smartcard ICs Example: Leakage of Masked Crypto Implementations Input to Penetration Testing: Details of masking scheme are known. Details of further side channel countermeasures are known. Problem (standard TOE sample) Resynchronization of measurement traces might be difficult. Detection of leakage of masks and masked values is usually limited to second-order DPA. Profiling need to be done in unsupervised mode with limited efficiency. Additional countermeasures might make the analysis difficult. Simplification (special TOE sample) Built-in trigger signals at the crypto operation. Resynchronization is no longer required. Output of masks. This enables advanced multivariate side channel analysis in supervised mode: templates and stochastic methods using masks. Deactivation of additional countermeasures. The number of traces needed for analysis is reduced. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
19 The Common Criteria Approach Penetration Testing for Smartcard ICs Example: Leakage of Masked Crypto Implementations Assessment Case 1: No leakage detected with special TOE samples. Assessment: attack is not practical in the operational environment. Case 2: (Partial/Complete) Leakage detected with special TOE samples. Further penetration tests need to be carried out to verify if the attack is practical in the operational environment with standard TOE samples: How big is the resynchronization effort needed? How big is the effort to deal with additional countermeasures? Assessment: according to the attack potential calculation for the different adversaries considered. The setting with the minimum number of points determines the attack potential. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
20 The Common Criteria Approach Example: Physical Probing Penetration Testing for Smartcard ICs Input to Penetration Testing: Access to details of chip layout (typically at the manufacturer s site). Details of probing countermeasures (e.g., active shield, bus and memory encryption) are known. Tools for Penetration Testing: Focused Ion Beam (Microprobing is prevented because of active shield and shrinked technology.) Questions for Penetration Testing: Can (single-point of) contacts be identified in the layout which leak sensitive information? Are these (single-point of) contacts in top metal layers? Can a (single-point) probing attack be successfully put in practice? Assessment: according to the test results and the attack potential calculation. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
21 The Common Criteria Approach Penetration Testing for Smartcard ICs Rough Classification of Considered Threats Threat Classes Inherent Information Leakage Malfunction due to Environmental Stress Forced Information Leakage Abuse of Functionality Deficiency of Random Number Testing Physical Probing Physical Manipulation Expertise, Knowledge of the TOE, Equipment Proficient to Expert (2/5+2/4), Several Types of Knowledge (0/9+0/5), Standard to Specialised Equipment (1/3+2/4). Expert (5+4), very critical hardware design knowledge in Identification (9), critical knowledge in Exploitation (5), Bespoke Equipment (5+6). Elapsed Time, Access to TOE, and Open Samples are add-on. Physical Probing and Physical Manipulation usually require beyond high attack potential, unless the required knowledge can be gained in another way and elapsed time is sufficiently short! Certification Body makes the final decision if interpretation is needed. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
22 The Common Criteria Approach Penetration Testing for Smartcard ICs Some Thoughts on Penetration Testing Approach On estimating attack potential Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
23 The Common Criteria Approach Penetration Testing for Smartcard ICs Some Thoughts on Penetration Testing Approach On Absolute Guarantees Of course, penetration testing cannot give an absolute guarantee that indeed all vulnerabilities are detected and assessed by an evaluator. However, the experience gained in smartcard testing over the last 15 years should give a certain guarantee that the required penetration tests are appropriately conducted. On Beyond High Attack Potential Industry might not be interested to invest in additional efforts to resist Beyond High attack potential. Users might be interested in lifting the attack potential thresholds. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
24 The FIPS 140 Approach History of FIPS 140 FIPS (1994, developed by a government and industry working group) FIPS (2001, supersedes FIPS 140-1) Draft FIPS (Revised Draft 09/11/09, will supersede FIPS 140-2) Further documents Derived Test Requirements for FIPS PUB Implementation Guidance for FIPS PUB and the Cryptographic Module Validation Program Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
25 The FIPS 140 Approach Physical security requirements (Draft FIPS 140-3) Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
26 The FIPS 140 Approach Physical security - Non-Invasive Attacks (Draft FIPS 140-3) New Chapter Non-Invasive Attacks in Draft FIPS 140-3, refers to Annex F for non-invasive attacks and their associated security functions addressed by this standard. Annex F: The addressed non-invasive attack methods are: SPA/SEMA, DPA/DEMA, TA and some extensions such as template attack, CPA, higher-order DPA. Requirements shall be applicable to single-chip cryptographic modules and single-chip components of hybrid modules. Requirements are optional for all other hardware module embodiments. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
27 The FIPS 140 Approach Physical Security - Non-Invasive Attacks (Draft FIPS 140-3) Security Level 1-2 no requirements Security Level 3 At Security Level 3, the cryptographic module shall protect the module s CSPs against all of the applicable non-invasive attacks Annex F specifies and associates with Approved or Allowed security functions. Documentation shall specify the mitigation techniques employed against these attacks and how these techniques mitigate access to the module s CSPs. The effectiveness of the mitigation techniques shall be specified. Security Level 4 In addition to the requirements for Security Level 3, the module shall undergo testing, and shall meet the requirements defined by the validation authority, for each of the applicable non-invasive attacks and the Approved or Allowed security functions which are relevant to those attacks, as specified in Annex F. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
28 The FIPS 140 Approach Penetration Testing Approach Penetration testing approach considers the aimed Security Level, the hardware embodiment, and the documentation for the cryptographic module. Notes: The vendor can explicitly exclude components from security requirements provided that a rationale is given and the component, even if malfunctioning or misused, cannot cause a compromise under any reasonable condition. Verdict of test procedure is pass or fail. Some sophisticated test procedures can be either done at the tester s facility, the vendor facility, or the tester supervises vendor performing tests at vendor facility. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
29 The FIPS 140 Approach Multiple Chip Cryptographic Modules (Security Level 4) Security Construction: Multiple Chip Cryptographic Module (Security Level 4) Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
30 The FIPS 140 Approach Multiple Chip Cryptographic Modules (Security Level 4) Security Construction: Multiple Chip Cryptographic Module (Security Level 4) Main Requirements: Tamper response and zeroization circuitry Tamper response and zeroization circuitry continuously monitors the tamper detection envelope. Tamper detection detects means such as cutting, drilling, milling, grinding, or dissolving of the potting material or disclosure. Tamper detection leads immediately to the zeroization of plaintext secret and private cryptographic keys. Main Physical Security Objective is Tamper Response. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
31 The FIPS 140 Approach Multiple Chip Cryptographic Modules (Security Level 4) Penetration Testing Approach: Tamper response and zeroization circuitry Test Procedures The tester shall breach the tamper detection envelope barrier and then verify that the module zeroize all plaintext secret and private keys. Some Detailed Test Questions Can the tamper detection envelope be penetrated without any tamper detection? How fast does the zeroization start and how long does it take? Can the zeroization process be deactivated or stopped? Are there burned-in effects in the battery backed RAM? Are there remanence effects at minimum operating temperature? Does the circuitry detect when the internal battery becomes undercharged? Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
32 Conclusion Conclusion Test requirements are under continous development, many research results of the previous years are taken into account for penetration testing. Penetration testing approaches and outcomes depend on the competence and experience of personnel in evaluation labs. (National and international) Harmonisation of penetration testing approaches depends on the Certification Bodies. Kerstin Lemke-Rust (H BRS) On Security Evaluation Testing 19 Feb / 32
Security IC Platform Protection Profile
Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Smartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001
Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea [email protected]
Security testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Joint Interpretation Library. Guidance for smartcard evaluation
Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Security testing for hardware product : the security evaluations practice
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing for hardware product : the security evaluations practice DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Secure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition
ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice IC and ES composition Version 1.2 March 2002 ETR-lite for Composition Annex A Table of Contents 1. Foreword...
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
FIPS 140-2 Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module
FIPS 140-2 Security Policy for Motorola, Inc Motorola Wireless Fusion on Windows CE Cryptographic Module Hybrid Module Software Component Version: 3.00.0 Hardware Component Version: CX 55222 Document Version
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September 2007. Version 1.
Supporting Document Guidance ETR template for composite evaluation of Smart Cards and similar devices September 2007 Version 1.0 Revision 1 CCDB-2007-09-002 Foreword This is a supporting document, intended
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21
Computer Security CIS 5370 Evaluating Systems Chapter 21 1 Evaluation Methodology 1. Set of security functionality requirements 2. Set of assurance a requirements e e 3. Methodology to determine if the
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
Smart Card Security How Can We Be So Sure?
Smart Card Security How Can We Be So Sure? Ernst Bovelander TNO Centre for Evaluation of Instrumentation and Security Techniques PO Box 5013 2600 GA Delft, The Netherlands [email protected] 1. Introduction
Joint Interpretation Library
Document purpose: provide rules to ensure that CC is used for hardware integrated circuits in a manner consistent with today s state of the art hardware Version 3.0 February 2009 Joint Interpretation Library
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/ V1A(s)
NXP Secure Smart Card Controllers Document information Info Content Keywords CC, Security Evaluation,, Functional Requirements, Security Functionality, Assurance Level, P5CC008, P5CC012 V1A/ V1A(s) Abstract
Supporting Document Guidance. Smartcard Evaluation. February 2010. Version 2.0 CCDB-2010-03-001
Supporting Document Guidance Smartcard Evaluation February 2010 Version 2.0 CCDB-2010-03-001 Foreword This is a supporting document, intended to complement the Common Criteria and the Common Evaluation
Joint Interpretation Library
Joint Interpretation Library Security Architecture requirements (ADV_ARC) for smart cards and similar devices Document purpose: provide guidance to developers to fulfill the Security Architecture requirements
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS
MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS Jason Reid, Mark Looi Information Security Research Centre - Queensland University of Technology [email protected], [email protected] Abstract
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
C033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
Common Criteria V3.1. Evaluation of IT products and IT systems
Common Criteria V3.1 Evaluation of IT products and IT systems Contents 1 Background... 1 2 Benefits of Evaluations... 3 3 Levels of Assurance... 3 3.1 EAL1 - Functionally Tested... 4 3.2 EAL2 - Structurally
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
SNAPcell Security Policy Document Version 1.7. Snapshield
SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
General Requirements for Accreditation of ASNITE. Testing Laboratories of Information Technology. (The 12th Edition) November 1, 2014
TIRP21 General Requirements for Accreditation of ASNITE Testing Laboratories of Information Technology 1/43 (Tentative Translation) Accreditation - Department - TIRP21 ASNITE Test IT Publication Document
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2
NIST Special Publication 800-29 A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2 Ray Snouffer Annabelle Lee Arch Oldehoeft Security Technology Group Computer
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01
VERSION 2.50 (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01 Approved by the Federal Ministry of Health Version 2.50, 2 nd January 2008 Version 2.50, 2nd January 2008 this page was
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
Software Modularisation and the Common Criteria
Software Modularisation and the Common Criteria A Smartcard Developer s Perspective Dr. Karsten Klohs Morpho, Riemekestraße 160, 33106 PADERBORN [email protected] Abstract. The Common Criteria (CC)
Security for Ubiquitous and Adhoc Networks
Security for Ubiquitous and Adhoc Networks Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
C013 Certification Report
C013 Certification Report VirtualEye v5.0 File name: Version: v1a Date of document: 8 March 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Physical Security: Status and Outlook
Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich Ideal World P C 2 Real World P C, C,errC 3 Implementation Attacks First publication ~ 16 years
Document ID: JIL-Security-Event-Management-Processs-V1-0 Subject: Security Event Management Process. Introduction
SOG-IS Recognition Agreement Joint Interpretation Library Working Group Policies and Procedures Document ID: JIL-Security-Event-Management-Processs-V1-0 Subject: Security Event Management Process Introduction
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk)
electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-CC-PP-0020-V3-2010-MA-01 Approved by the Federal Ministry of Health Version 2.9, 19th April 2011 electronic Health Card Version 2.9,
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
Microsemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Using AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Secure egovernment Where convenience meets security. www.infineon.com/ccs
Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
Security in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
