Certification Report EAL 4+ (ALC_DVS.2,AVA_VAN.5) Evaluation of TÜBİTAK BİLGEM UEKAE AKİS v2.2.8I issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.01/TSE-CCCS-23 2 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 2 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 TABLE OF CONTENTS Table of contents .................................................................................................................................2 Document Information .......................................................................................................................3 Document Change Log .......................................................................................................................3 DISCLAIMER.....................................................................................................................................3 FOREWORD.......................................................................................................................................4 RECOGNITION OF THE CERTIFICATE ......................................................................................5 1 EXECUTIVE SUMMARY..............................................................................................................6 2 CERTIFICATION RESULTS.........................................................................................................8 2.1 Identification of Target of Evaluation ........................................................................................8 2.2 Security Policy...............................................................................................................................9 2.3 Assumptions and Clarification of Scope....................................................................................12 2.4 Architectural Information ..........................................................................................................12 2.5 Documentation............................................................................................................................13 2.6 IT Product Testing ......................................................................................................................14 2.7 Evaluated Configuration ............................................................................................................15 2.8 Results of the Evaluation............................................................................................................17 2.9 Evaluator Comments / Recommendations.................................................................................19 3 SECURITY TARGET ....................................................................................................................19 4 GLOSSARY ....................................................................................................................................19 5 BIBLIOGRAPHY...........................................................................................................................20 6 ANNEXES......................................................................................................................................20 3 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 3 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 Document Information Date of Issue 10.12.2014 Version of Report 1.0 Author Zümrüt MÜFTÜOĞLU&İbrahim Halil KIRMIZI Technical Responsible Mustafa YILMAZ Approved Mariye Umay AKKAYA Date Approved 12.12.2014 Certification Report Number 21.0.01/14-044 Sponsor and Developer TÜBİTAK BİLGEM UEKAE Evaluation Lab TÜBİTAK BİLGEM OKTEM TOE Name AKİS 2.2.8I Pages 20 Document Change Log Release Date Pages Affected Remarks/Change Reference V1.0 11.12.2014 All First Released DISCLAIMER This certification report and the IT product defined in the associated Common Criteria document has been evaluated at an accredited and licensed evaluation facility conformance to Common Criteria for IT Security Evaluation, version 3.1,revision 4 , using Common Methodology for IT Products Evaluation, version 3.1 , revision 4. This certification report and the associated Common Criteria document apply only to the identified version and release of the product in its evaluated configuration. Evaluation has been conducted in accordance with the provisions of the CCCS, and the conclusions of the evaluation facility in the evaluation report are consistent with the evidence adduced. This report and its associated Common Criteria document are not an endorsement of the product by the Turkish Standardization Institution, or any other organization that recognizes or gives effect to this report and its associated Common Criteria document, and no warranty is given for the product by the Turkish Standardization Institution, or any other organization that recognizes or gives effect to this report and its associated Common Criteria document. 4 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 4 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 FOREWORD The Certification Report is drawn up to submit the Certification Commission the results and evaluation information upon the completion of a Common Criteria evaluation service performed under the Common Criteria Certification Scheme. Certification Report covers all non-confidential security and technical information related with a Common Criteria evaluation which is made under the STCD Common Criteria Certification Scheme. This report is issued publicly to and made available to all relevant parties for reference and use. The Common Criteria Certification Scheme (CCSS) provides an evaluation and certification service to ensure the reliability of Information Security (IS) products. Evaluation and tests are conducted by a public or commercial Common Criteria Evaluation Facility (CCTL) under CCCS’ supervision. CCEF is a facility, licensed as a result of inspections carried out by CCCS for performing tests and evaluations which will be the basis for Common Criteria certification. As a prerequisite for such certification, the CCEF has to fulfill the requirements of the standard ISO/IEC 17025 and should be accredited by accreditation bodies. The evaluation and tests related with the concerned product have been performed by TÜBİTAK BİLGEM OKTEM, which is a public CCTL. A Common Criteria Certificate given to a product means that such product meets the security requirements defined in its security target document that has been approved by the CCCS. The Security Target document is where requirements defining the scope of evaluation and test activities are set forth. Along with this certification report, the user of the IT product should also review the security target document in order to understand any assumptions made in the course of evaluations, the environment where the IT product will run, security requirements of the IT product and the level of assurance provided by the product. This certification report is associated with the Common Criteria Certificate issued by the CCCS for AKİS v2.2.8I whose evaluation was completed on 02.10.2014 and whose evaluation technical report was drawn up by TÜBİTAK BİLGEM OKTEM (as CCTL), and with the Security Target document with version no 12 of the relevant product. The certification report, certificate of product evaluation and security target document are posted on the STCD Certified Products List at bilisim.tse.org.tr portal and the Common Criteria Portal 5 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 5 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 (the official web site of the Common Criteria Project).The certification report, certificate of product evaluation and security target document are posted on the STCD Certified Products List at bilisim.tse.org.tr portal and the Common Criteria Portal (the official web site of the Common Criteria Project). RECOGNITION OF THE CERTIFICATE The Common Criteria Recognition Arrangement logo is printed on the certificate to indicate that this certificate is issued in accordance with the provisions of the CCRA. The CCRA has been signed by the Turkey in 2003 and provides mutual recognition of certificates based on the CC evaluation assurance levels up to and including EAL4. The current list of signatory nations and approved certification schemes can be found on: http://www.commoncriteriaportal.org. 6 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 6 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 1 EXECUTIVE SUMMARY This report constitutes the certification results by the certification body on the evaluation results applied with requirements of the Common Criteria for Information Security Evaluation. Evaluated IT product name: AKİS IT Product version: v2.2.8I Developer’s Name: TÜBİTAK BİLGEM UEKAE Name of CCTL: TÜBİTAK BİLGEM OKTEM Assurance Package: EAL 4+ (ALC_DVS.2, AVA_VAN.5) Completion date of evaluation: 02.10.2014 (DTR 21 TR 01) 04.12.2014(DTR 21 TR 02) 09.12.2014(DTR 21 TR 03) AKİS v2.2.8I contact based smartcard is a composite product consisting of embedded operating system and the security IC. The TOE consists of  AKİS v2.2.8I embedded operating system,  IC dedicated software (test and support software including libraries),  security IC,  guidance documentation,  activation data. 1.1 Major Properties of the TOE The TOE provides the following services to the application:  Protection against modification, probing, environmental stress and emanation attacks mainly by platform specification and embedded operating system support,  Access control to services and data by using role attribute, PIN-knowledge attribute, activation agent authentication status, personalization agent authentication status, initialization agent authentication status and device authentication status.  The following identification and authentication services: -activation agent identification & authentication by asymmetric cryptographic verification, -initialization and personalization agent identification & authentication by symmetric decryption, -terminal and chip identification & authentication by certificate authentication, - role identification & authentication by certificate authentication, -user identification & authentication by PIN verification.  The following cryptographic services: -SHA-256 Operation, -AES Operation, -CMAC Operation, -TDES Operation, -Signature generation PKCS#1 v1.5, -Signature generation PKCS#1 v2.1, -Signature generation ISO/IEC 9796-2 Scheme 1, 7 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 7 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 -Signature verification ISO/IEC 9796-2 Scheme 1, -asymmetric decryption PKCS#1 v1.5, -asymmetric decryption PKCS#1 v2.1, -asymmetric encryption/decryption RAW RSA, -RSA key pair generation -random number generation.  Security management, for services and data by supporting activation agent, initialization agent and personalization agent roles, and any other roles defined by the application.  Secure messaging services between TOE and the terminal. There are 6 assumptions made in the ST regarding the development environment, production environment, initialization and maintenance environment, use environment. The ST defines 6 Organizational Security Policies. There are 14 threats covered by TOE and the operational environment. Details with threats are outlined in the Security Target, chapter 4.3 The results documented in the Evaluation Technical Report (ETR) for this product provide sufficient evidence that it meets the EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 assurance requirements for the evaluated security functionality. The evaluation was conducted using the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 4, for conformance to the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4. CCCS declares that the AKİS v2.2.8I evaluation meets all the conditions of the Arrangement on the Recognition of Common Criteria Certificates and that the product will be listed on the CCCS Certified Products List (CPL) and the Common Criteria portal (the official website of the Common Criteria Project) Although the TOE was evaluated for RSA applications implemented with 1024-bit key size and found safe, It is not recommended to use RSA applications implemented with 1024-bit key size by the reputable standards producing organizations (references can be found in national and international documents and standards). In this scope, independently of the Common Criteria Evaluation, It is not recommended to use of RSA applications with 1024-bit key size. 1.2 Usage of the TOE The TOE is designed and developed to be as a platform for smart card applications. It supports the life cycle requirements of the smart card applications and provides security services to the smart card applications. AKİSv2.2.8Isupports two different configurations to the application owner:  Chip configuration,  SAM configuration. Chip configuration is developed to act as user card application like eIDs. The SAM configuration is developed to act on behalf of the terminal as a secure access module. In chip configuration, two secure messaging types are performed. The first one is mutual authentication between card (chip) and the terminal by certificate exchange. In this method, both the terminal and the card possess a public key certificate and the corresponding private key. They share their trusted public keys with 8 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 8 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 each other by certificate exchange procedure. Next, they agree on secure messaging keys by key agreement procedure. Finally secure messaging starts. This secure messaging starts in each mutual authentication automatically. In the second method, a random data is generated by the terminal and sent to TOE confidentially. Next, using this random data, card and the terminal agree on the secure messaging keys by key agreement procedure. Finally, TOE starts secure messaging. Public key cryptography is used in each step of the key agreement process to ensure confidentiality. No certificate is needed in this method. In SAM configuration, only the second method is performed. The other difference between the two configurations is in the terminal authentication method. Chip configuration provides terminal authentication by internal and external authentication with certificate exchange. But in SAM configuration, it is provided by PIN authentication. By this way, “authenticated terminal" means PIN authenticated terminal for SAM configuration. 2 CERTIFICATION RESULTS 2.1 Identification of Target of Evaluation Certificate Number 21.0.01/TSE-CCCS-23 TOE/PP Name and Version AKİS v2.2.8I Security Target Title AKİS v2.2.8I Security Target Security Target / PP Document Version 12 Security Target Document Date 25.11.2014 Assurance Level EAL4+ (ALC_DVS.2, AVA_VAN.5) Criteria •Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB- 2012-09-001, Version 3.1, Revision 4, September 2012 •Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; CCMB-2012-09-002, Version 3.1 Revision 4, September 2012 •Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; CCMB- 2012-09-003, Version 3.1 Revision 4, September 2012 Methodology Common Criteria for Information Technology Security Evaluation, Evaluation Methodology; CCMB-2012-09-004, Version 3.1, Revision 4, September 2012 Protection Profile Conformance - Common Criteria Conformance •Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB- 2012-09-001, Version 3.1, Revision 4, September 2012 • Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; CCMB-2012-09-002, Version 3.1 Revision 4, September 2012,extended 9 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 9 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 •Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; CCMB- 2012-09-003, Version 3.1 Revision 4, September 2012,conformant Sponsor and Developer TÜBİTAK BİLGEM UEKAE eID Technologies Unit Evaluation Facility TÜBİTAK BİLGEM OKTEM Certification Scheme TSE-CCCS 2.2 Security Policy Organizational security policies of the composite TOE is given in Table 1. # Policy Name Definition 1. P.Identification_and_Authentication The TOE should support  chip authentication,  terminal authentication,  PIN verification,  role holder authentication and any combination of this. 2. P.PKI There will be terminal authentication CA, chip authentication CA, Role CA all of which certificates are signed by Root CA. terminal certificates, chip certificates and role certificates will be signed by according CA. 3. P.Access_Control Role attribute, PIN knowledge attribute, device authentication attribute of the user will be used as a security attribute to determine the access control behavior and security management privileges during operational phase. 10 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 10 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 4. P.PreOperational_Security_Management The TOE should support  activation agent,  initialization agent,  personalization agent functions and roles 5. P.Operational_Security_Management The TOE should support  any management function and role defined by the application. 11 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 11 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 6. P.Cryptographic_Operations The TOE should support following cryptographic functions:  RSA key pair generation,  hash calculation ,  eSign operations;  PKCS #1 v2.1,  PKCS #1 v1.5,  ISO/IEC 9796-2 Scheme 1,  asymmetric decryption;  PKCS #1 v2.1 OAEP,  PKCS #1 v1.5,  Raw RSA,  asymmetric encryption;  Raw RSA,  TDES calculation,  AES operation,  CMAC operation. Table 1. Organizational security policies of the composite TOE 12 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 12 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 2.3 Assumptions and Clarification of Scope Assumptions for the operational environment of the composite TOE is given in Table 2. # Assumption Brief Description 1. A.Secure_Application Application will correctly define the access rules of the application data. 2. A.Key_and_Certificate_Security All keys and certificates should be produced, stored and used securely outside of TOE. 3. A.PIN_Handling PINS belonging to the application should be handled securely by PIN owner. 4. A.Personnel_Security Personnel who hold privileges over the TOE should act responsively and according to the application requirements. 5. A.Trusted_Parties It is assumed that the authenticated parties that the TOE communicates act responsively. 6. A.Pre-Operational_Environment It is assumed that the Physical environments of initialization and personalization phases are secure. Table 2. Composite TOE Assumptions 2.4 Architectural Information TOE consists of the communication subsystem, command subsystem, security subsystem, memory and file subsystem: Communication Subsystem Communication subsystem manages the communication between the AKİS v2.2.8I and the external world. Two layered communication takes place between the outer world and the AKİS v2.2.8I, for the transmission purposes T=1 protocol is implemented, for the application purposes APDU packets are used [ 12 ]. Command Subsystem Command subsystem processes the commands received from communication subsystem. It performs the commands via help of the Security Subsystem, Memory and File System Subsystem. 13 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 13 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 Cryptographic Support Subsystem All cryptographic functions like encryption, decryption, signature generation, signature verification, random number generation, hash calculation are performed within this subsystem. Security Subsystem Access control conditions and lifecycle management operations are performed within this subsystem. Whenever a security control is to be done via command subsystem, it asks to the security subsystem if the action is allowed or not. Memory and File System Memory and filesystem manages the non-volatile memory of the security IC. Memory and filesystem gives services to both of the command subsystem and the security subsystem. System Subsystem System Subsystem includes the functions related to the whole system such as security controls of the system. Figure 1. AKİS v2.2.8I Logical View 2.5 Documentation During the evaluation; the configuration of evaluation evidences which are composed of Software source code, Common Criteria documents, supporting documents and guides are shown below: Name of Document Version Number Publication Date AKİS v2.2.8I Security Target Document 12 25.11.2014 AKİS v2.2.8I Security Target Lite Document 01 17.12.2014 AKİS v2.2.8I Fonksiyonel Belirtim Dokümanı 06 08.12.2014 AKİS v2.2.8I Güvenlik Mimarisi Dokümanı 04 30.09.2014 AKİS v2.2.8I Karma Ürün Tasarım Kanıtı 06 29.09.2014 14 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 14 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 AKİS v2.2.8I Tasarım Dokümanı 07 08.12.2014 UKİS v2.2 ve AKİS v2.2 Ailesi için Fark Dokümanı 02 10.09.2014 AKİS v2.2.8I Teslim ve İşletim Dokümanı 04 29.08.2014 AKİS 2 Serisi ve UKİS 2 Serisi için GEM Yönetici ve Kullanıcı Kılavuzu 20 04.12.2014 AKİS 2 Serisi ve UKIS 2 Serisi için Kullanıcı Kılavuzu 12 04.12.2014 AKİS 2 Serisi ve UKIS 2 Serisi için Yönetici ve Kullanıcı Kılavuzu 20 04.12.2014 AKİS 2 Serisi ve UKIS 2 Serisi için Yönetici ve Kullanıcı Kılavuzu EK 04 19.11.2014 AKİS v2.2.8I Geliştirme Ortam Güvenliği ve Geliştirme Araçları Dokümanı 04 24.09.2014 AKİS v2.2.8I Konfigurasyon Yönetim Planı 11 08.12.2014 AKİS v2.2.8I Teslim Kanıt Dokümanı 02 24.09.2014 AKS v2.2.8I Teslim ve İşletim Dokümanı 04 29.08.2014 UKIS v2.2 ve AKİS v2.2 Ailesi için Yaşam Döngüsü Dokümanı 03 19.11.2014 AKİS v2.2.8I Test Dokümanı 13 08.12.2014 AKİS v2.2I Sızma Test Planı 01 08.02.2013 2.6. IT Product Testing During the evaluation, all evaluation evidences of TOE were delivered and transferred completely to CCTL by the developers. All the delivered evaluation evidences which include software, documents, etc are mapped to the assurance families of Common Criteria and Common Methodology; so the connections between the assurance families and the evaluation evidences has been established. The evaluation results are available in the Evaluation Technical Report (ETR) of AKİS 2.2.8I. It is concluded that the TOE supports EAL 4+ (ALC_DVS.2,AVA_VAN.5) . There are 24 assurance families which are all evaluated with the methods detailed in the ETR. 15 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 15 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 IT Product Testing is mainly realized in two parts: 1) Developer Testing :  TOE Test Coverage: Developer has prepared TOE System Test Document according to the TOE Functional Specification documentation.  TOE Test Depth: Developer has prepared TOE System Test Document according to the TOE Design documentation which include TSF subsystems and its interactions.  TOE Functional Testing: Developer has made functional tests according to the test documentation. Test plans, test scenarios, expected test results and actual test results are in the test documentation. 2) Evaluator Testing :  Independent Testing: Evaluator has done a total of 43 sample independent tests. 19 of them are selected from developer`s test plans. The other 24 tests are evaluator`s independent tests. All of them are related to TOE security functions.  Penetration Testing: Evaluator has done 35 penetration tests to find out if TOE`s vulnerabilities can be used for malicious purposes. The potential vulnerabilities and the penetration tests are in “TOE Security Functions Penetration Tests Scope” which is in Annex-D of the ETR and the penetration tests and their results are available in detail in the ETR document as well. 2.7 Evaluated Configuration The TOE is designed and developed to be as a platform for smart card applications. It supports the life cycle requirements of the smart card applications and provides security services to the smart card applications. AKİS v2.2.8I supports two different configurations to the application owner: -chip configuration , -SAM configuration. Chip configuration is developed to act as user card application like eIDs. The SAM configuration is developed to act on behalf of the terminal as a secure access module. There is a slight difference between two configurations in their secure messaging properties. In chip configuration, two secure messaging types are performed. The first one is mutual authentication between card (chip) and the terminal by certificate exchange. 16 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 16 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 In this method, both the terminal and the card possess a public key certificate and the corresponding private key. They share their trusted public keys with each other by certificate exchange procedure. Next, they agree on secure messaging keys by key agreement procedure. Finally secure messaging starts. This secure messaging starts in each mutual authentication automatically. In the second method, a random data is generated by the terminal and sent to TOE confidentially. Next, using this random data, card and the terminal agree on the secure messaging keys by key agreement procedure. Finally, TOE starts secure messaging. Public key cryptography is used in each step of the key agreement process to ensure confidentiality. No certificate is needed in this method. In SAM configuration, only the second method is performed. The other difference between the two configurations is in the terminal authentication method. Chip configuration provides terminal authentication by internal and external authentication with certificate exchange. But in SAM configuration, it is provided by PIN authentication. By this way, “authenticated terminal” means PIN authenticated terminal for SAM configuration. TOE has following security features for both configurations:  Protection against modification, probing, environmental stress and emanation attacks mainly by platform specification and embedded operating system support  Access control to services and data by using role attribute, PIN-knowledge attribute, activation agent authentication status, personalization agent authentication status, initialization agent authentication status and device authentication status.  The following identification and authentication services: -activation agent identification & authentication by asymmetric cryptographic verification, - initialization and personalization agent identification & authentication by symmetric decryption, -terminal and chip identification & authentication by certificate authentication, - role identification & authentication by certificate authentication, -user identification & authentication by PIN verification.  The following Cryptographic Services -SHA-256 Operation, -AES Operation2 , -CMAC Operation, -TDES Operation3 , -signature generation PKCS#1 v1.5, - signature generation PKCS#1 v2.1, - signature generation ISO/IEC 9796-2 Scheme 1, - signature verification ISO/IEC 9796-2 Scheme 14 , -asymmetric decryption PKCS#1 v1.5, - asymmetric decryption PKCS#1 v2.1, -asymmetric encryption/decryption RAW RSA 5, -RSA key pair generation -random number generation.  Security management, for services and data by supporting activation agent, initialization agent and personalization agent roles, and any other roles defined by the application.  Secure messaging services between TOE and the terminal. 17 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 17 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 2.8 Results of the Evaluation Table 3 below provides a complete listing of the Security Assurance Requirements for the TOE. These requirements consists of the Evaluation Assurance Level 4 (EAL 4) components as specified in Part 3 of the Common Criteria, augmented with ALC_DVS.2 and AVA_VAN.5. Assurance Class Component ID Component Title Development ADV_ARC.1 Security architecture description ADV_FSP.4 Complete Functional Specification ADV_IMP.1 Implementation representation of the TSF ADV_TDS.3 Basic Modular Design Guidance documents AGD_OPE.1 Operational user guidance AGD_PRE.1 Preparative procedures Life-cycle support ALC_CMC.4 Production support, acceptance procedures and automation ALC_CMS.4 Problem Tracking CM Coverage ALC_DEL.1 Delivery procedures ALC_DVS.2 Sufficiency of security measures ALC_LCD.1 Developer defined life-cycle model ALC_TAT.1 Well-defined development tools Security Target Evaluation ASE_CCL.1 Conformance claims ASE_ECD.1 Extended components definition 18 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 18 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 ASE_INT.1 ST introduction ASE_OBJ.2 Security objectives ASE_REQ.2 Derived security requirements ASE_SPD.1 Security problem definition ASE_TSS.1 TOE summary specification Tests ATE_COV.2 Analysis of coverage ATE_DPT.1 Testing: basic design ATE_FUN.1 Functional testing ATE_IND.2 Independent testing - sample Vulnerability assessment AVA_VAN.5 Advanced Methodological Vulnerability Analysis Table 3 Security Assurance Requirements of the TOE The Evaluation Team assigned a Pass, Fail, or Inconclusive verdict to each work unit of each EAL 4 assurance component. For Fail or Inconclusive work unit verdicts, the Evaluation Team advised the developer about the issues requiring resolution or clarification within the evaluation evidence. In this way, the Evaluation Team assigned an overall Pass verdict to the assurance component only when all of the work units for that component had been assigned a Pass verdict. So for TOE “AKİS v2.2.8I” the results of the assessment of all evaluation tasks are “Pass”. As a result,AKİS v2.2.8I product was found to fulfill the Common Criteria requirements for each of 24 assurance families and provide the assurance level EAL 4+ (ALC_DVS.2,AVA_VAN.5) .This result shows that TOE is resistant against the “HIGH “level attack potential and it countervails the claims of the functional and assurance requirements which are defined in ST document. 19 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 19 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 2.9 Evaluator Comments / Recommendations No recommendations or comments have been communicated to CCCS by the evaluators related to the evaluation process of AKİS v2.2.8I product, result of the evaluation, or the ETR. 3 SECURITY TARGET The ST associated with this Certification Report is identified by the following nomenclature: Title : AKİS v2.2.8I Security Target Version No: 12 Date of Document: 25.11.2014 A public version has been created and verified according to ST-Santizing: Title : AKİS v2.2.8I Security Target Lite Version No: 01 Date of Document: 17.12.2014 This Security Target describes the TOE, intended IT environment, security objectives, security requirements (for the TOE and IT environment), TOE security functions and all necessary rationale. 4 GLOSSARY ADV : Assurance of Development AGD : Assurance of Guidance Documents ALC : Assurance of Life Cycle ASE : Assurance of Security Target Evaluation ATE : Assurance of Tests Evaluation AVA : Assurance of Vulnerability Analysis BİLGEM : Bilişim ve Bilgi Güvenliği İleri Teknolojiler Araştırma Merkezi CC : Common Criteria (Ortak Kriterler) CCCS : Common Criteria Certification Scheme (TSE) CCRA : Common Criteria Recognition Arrangement CCTL : Common Criteria Test Laboratory (OKTEM) CEM :Common Evaluation Methodology CMC : Configuration Management Capability CMS : Configuration Management Scope DEL : Delivery EAL : Evaluation Assurance Level GR : Observation Report - Gözlem Raporu OKTEM : Ortak Kriterler Test Merkezi OPE : Opretaional User Guidance OSP : Organisational Security Policy PP : Protection Profile PRE : Preperative Procedures 20 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 20 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01 SAR : Security Assurance Requirements SFR : Security Functional Requirements ST : Security Target STCD :Software Test and Certification Department TOE : Target of Evaluation TSF : TOE Secırity Functionality TSFI : TSF Interface 5 BIBLIOGRAPHY [1] Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4, September 2012 [2] Common Methodology for Information Technology Security Evaluation, CEM, Version 3.1 Revision 4, September 2012 [3] AKiS v2.2.8I Security Target Version: 12 Date: 25.11.2014 [4] Evaluation Technical Report (Document Code: DTR 21 TR 03), December 09, 2014 [5] Evaluation Technical Report (Document Code: DTR 21 TR 02), December 04, 2014 [6] Evaluation Technical Report (Document Code: DTR 21 TR 01), October 02, 2014 [7] Composite product evaluation for Smart Cards and similar devices v1.0 rev 1 Sep 2007 (CCDB- 2007-09-001) [8] ETR for composite evaluation according to M7892 B11(Version:5),March 20,2014 [9] PCC-03-WI-04 CERTIFICATION REPORT PREPARATION INSTRUCTIONS, Version 2.0 [10] CC Supporting Document Guidance, Mandatory Technical Document, Application of Attack Potential to Smartcards, Version 2.7 Revision 1, March 2009, CCDB-2009-03-001 [11] CC Supporting Document Guidance, Mandatory Technical Document, Application of CC to Integrated Circuits, Version 3.0 Revision 1, March 2009, CCDB-2009-03-002 [ 12 ] ISO 7816-3 Information Technology – Identification Cards – Integrated Circuits with Contacts Part 3: Electronic Signals and Transmission Protocols - T=1 Protocol 6 ANNEXES There is no additional information which is inappropriate for reference in other sections. 21 SOFTWARE TEST and CERTIFICATION DEPARTMENT COMMON CRITERIA CERTIFICATION SCHEME CERTIFICATION REPORT Date of Issue: 22/07/2013 Page : 21 / 21 Rev. No : 02 Date of Rev: 17/10/2014 Document No: STCD-01-01-FR-01