BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 1 / 23 Certification Report EAL 5+ (ALC_DVS.2, AVA_VAN.5) Evaluation of TÜBİTAK BİLGEM UEKAE AKiS GEZGiN_N v1.0.1.0 SAC&EAC Configuration issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.03/TSE-CCCS-72 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 2 / 23 TABLE OF CONTENTS TABLE OF CONTENTS ..........................................................................................................................................................2 DOCUMENT INFORMATION...............................................................................................................................................3 DOCUMENT CHANGE LOG .................................................................................................................................................3 DISCLAIMER ...........................................................................................................................................................................3 FOREWORD .............................................................................................................................................................................4 RECOGNITION OF THE CERTIFICATE............................................................................................................................5 1 EXECUTIVE SUMMARY ....................................................................................................................................................6 2 CERTIFICATION RESULTS...............................................................................................................................................9 2.1 IDENTIFICATION OF TARGET OF EVALUATION ..................................................................................................9 2.2 SECURITY POLICY ........................................................................................................................................................10 2.3 ASSUMPTIONS AND CLARIFICATION OF SCOPE ................................................................................................13 2.4 ARCHITECTURAL INFORMATION ...........................................................................................................................13 2.5 DOCUMENTATION ........................................................................................................................................................14 2.6 IT PRODUCT TESTING..................................................................................................................................................15 2.7 EVALUATED CONFIGURATION.................................................................................................................................15 2.8 RESULTS OF THE EVALUATION ...............................................................................................................................16 2.9 COMMENTS / RECOMMENDATIONS........................................................................................................................16 3 SECURITY TARGET..........................................................................................................................................................19 4 GLOSSARY ..........................................................................................................................................................................20 5 BIBLIOGRAPHY.................................................................................................................................................................20 6 ANNEXES .............................................................................................................................................................................23 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 3 / 23 Document Information Date of Issue 12.03.2021 Approval Date 17.03.2021 Certification Report Number 21.0.03/21-004 Sponsor and Developer TÜBİTAK BİLGEM UEKAE Evaluation Facility TÜBİTAK BİLGEM TDBY OKTEM TOE AKiS GEZGiN_N v1.0.1.0 SAC&EAC Configuration Pages 23 Prepared by İbrahim Halil KIRMIZI Reviewed by Halime Eda BİTLİSLİ ERDİVAN This report has been prepared by the Certification Expert and reviewed by the Technical Responsible of which signatures are above. Document Change Log Release Date Pages Affected Remarks/Change Reference 1.0 19.02.2021 All First Release DISCLAIMER This certification report and the IT product defined in the associated Common Criteria document has been evaluated at an accredited and licensed evaluation facility conformant to Common Criteria for IT Security Evaluation, version 3.1, revision 5, using Common Methodology for IT Products Evaluation, version 3.1, revision 5. This certification report and the associated Common Criteria document apply only to the identified version and release of the product in its evaluated configuration. Evaluation has been conducted BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 4 / 23 in accordance with the provisions of the CCCS, and the conclusions of the evaluation facility in the evaluation report are consistent with the evidence adduced. FOREWORD The Certification Report is drawn up to submit the Certification Commission the results and evaluation information upon the completion of a Common Criteria evaluation service performed under the Common Criteria Certification Scheme. Certification Report covers all non-confidential security and technical information related with a Common Criteria evaluation which is made under the ITCD Common Criteria Certification Scheme. This report is issued publicly to and made available to all relevant parties for reference and use. The Common Criteria Certification Scheme (CCCS) provides an evaluation and certification service to ensure the reliability of Information Security products. Evaluation and tests are conducted by a public or commercial Common Criteria Evaluation Facility (CCTL = Common Criteria Testing Laboratory) under CCCS’ supervision. CCTL is a facility, licensed as a result of inspections carried out by CCCS for performing tests and evaluations which will be the basis for Common Criteria certification. As a prerequisite for such certification, the CCTL has to fulfill the requirements of the standard ISO/IEC 17025 and should be accredited by accreditation bodies. The evaluation and tests related with the concerned product have been performed by TÜBİTAK BİLGEM TDBY OKTEM, which is a public/commercial CCTL. A Common Criteria Certificate given to a product means that such product meets the security requirements defined in its security target document that has been approved by the CCCS. The Security Target document is where requirements defining the scope of evaluation and test activities are set forth. Along with this certification report, the user of the IT product should also review the security target document in order to understand any assumptions made in the course of evaluations, the environment where the IT product will run, security requirements of the IT product and the level of assurance provided by the product. This certification report is associated with the Common Criteria Certificate issued by the CCCS for AKiS GEZGiN_N v1.0.1.0 SAC&EAC Configuration whose evaluation was completed on 10.02.2021 and with the Security Target document with version no 10 of the relevant product. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 5 / 23 The certification report, certificate of product evaluation and security target document are posted on the ITCD Certified Products List at bilisim.tse.org.tr portal and the Common Criteria Portal (the official web site of the Common Criteria Project). RECOGNITION OF THE CERTIFICATE The Common Criteria Recognition Arrangement logo is printed on the certificate to indicate that this certificate is issued in accordance with the provisions of the CCRA. The CCRA has been signed by the Turkey in 2003 and provides mutual recognition of certificates based on the CC evaluation assurance levels up to and including EAL2. The current list of signatory nations and approved certification schemes can be found on: http://www.commoncriteriaportal.org BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 6 / 23 1. EXECUTIVE SUMMARY This report constitutes the certification results by the certification body on the evaluation results applied with requirements of the Common Criteria for Information Security Evaluation. Evaluated IT product name: AKiS GEZGiN_N SAC&EAC Configuration IT Product version: v1.0.1.0 Developer’s Name: TÜBİTAK BİLGEM UEKAE Name of CCTL: TÜBİTAK BİLGEM TDBY OKTEM Assurance Package: EAL 5+ (ALC_DVS.2, AVA_VAN.5) Completion date of evaluation: 10.02.2021 1.1. Brief Description The TOE is the composition of the contactless smartcard chips P71D320P of NXP SmartMX3 platform with embedded software including electronic Machine Readable Travel Document (eMRTD) Application 1.2. Major Security Features The TOE provides the following security services; • Protection against modification, probing, environmental stress and emanation attacks, • Passive Authentication (PA), • Supplemental Access Control (SAC), • Extended Access Control (EAC), • Cryptosystem migration (Algorithm change during certificate verification transaction). BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 7 / 23 1.3. Threats The threats are; • T.Read_Sensitive_Data: An attacker tries to gain the sensitive biometric reference data through the communication interface of the travel document’s chip. Note, that the sensitive biometric reference data are stored only on the travel document’s chip as private sensitive personal data whereas the MRZ data and the portrait are visually readable on the physical part of the travel document as well • T.Counterfeit: An attacker with high attack potential produces an unauthorized copy or reproduction of a genuine travel document’s chip to be used as part of a counterfeit travel document. This violates the authenticity of the travel document’s chip used for authentication of a traveler by possession of a travel document. The attacker may generate a new data set or extract completely or partially the data from a genuine travel document’s chip and copy them on another appropriate chip to imitate this genuine travel document’s chip • T.Skimming: An attacker imitates an inspection system in order to get access to the user data stored on or transferred between the TOE and the inspecting authority connected via the contactless interface of the TOE • T.Eavesdropping: An attacker is listening to the communication between the travel document and the PACE authenticated BIS-PACE in order to gain the user data transferred between the TOE and the terminal connected • T.Tracing: An attacker tries to gather TOE tracing data (i.e., to trace the movement of the travel document) unambiguously identifying it remotely by establishing or listening to a communication via the contactless interface of the TOE • T.Forgery: An attacker fraudulently alters the User Data or/and TSF-data stored on the eMRTD or/and exchanged between the TOE and the terminal connected in order to outsmart the PACE authenticated BIS PACE by means of changed travel document holder’s related reference data BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 8 / 23 (like biographic or biometric data). The attacker does it in such a way that the terminal connected perceives these modified data as authentic one • T.Abuse-Func: An attacker may use functions of the TOE which shall not be used in TOE operational phase in order to o manipulate or to disclose the User Data stored in the TOE, o manipulate or to disclose the TSF data stored in the TOE, o manipulate (bypass, deactivate or modify) soft-coded security functionality of the TOE. This threat addresses the misuse of the functions for the initialization and personalization in the operational phase after delivery to the travel document holder • T.Information_Leakage: An attacker may exploit information which is leaked from the TOE during its usage in order to disclose confidential User Data or/and TSF-data stored on the travel document or/and exchanged between the TOE and the terminal connected • T.Phys-Tamper: An attacker may perform physical probing of the travel document in order to o disclose TSF-data, o disclose/reconstruct the travel document’s chip Embedded Software. o An attacker may physically modify the travel document in order to alter (i) its security functionality (hardware and software part, as well), (ii) the User Data or TSF-data stored on the travel document • T.Malfunction: An attacker may cause a malfunction of the travel document’s hardware and Embedded Software by applying environmental stress in order to o deactivate or modify security features or functionality of the TOE’ hardware o circumvent, deactivate or modify security functions of the TOE’s Embedded Software. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 9 / 23 2. CERTIFICATION RESULTS 2.1. Identification of Target of Evaluation Certificate Number 21.0.03/TSE-CCCS-72 TOE Name and Version AKiS GEZGiN_N v1.0.1.0 SAC&EAC Configuration Security Target Title Security Target of AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration Security Target Version 10 Security Target Date 18.01.2021 Assurance Level EAL 5+ (ALC_DVS.2, AVA_VAN.5) Criteria • Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB-2017-04-001, Version 3.1, Revision 5, April 2017 • Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; CCMB-2017-04-002, Version 3.1, Revision 5, April 2017 • Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; CCMB-2017-04-003, Version 3.1, Revision 5, April 2017 Methodology Common Criteria for Information Technology Security Evaluation, Evaluation Methodology; CCMB-2017-04-004, Version 3.1, Revision 5, April 2017 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 10 / 23 Protection Profile Conformance Common Criteria Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, BSI-CC-PP-0056-V2-2012, version 1.3.2, December 5th 2012 Platform SmartMX3 P71D320P, NXP Technologies Secrurity Target Title of the Platform Hardware NXP Secure Smart Card Controller N7021 VA Security Target Lite Securirty Target Version and Date of the Platform Hardware Rev. 2.3, June 4th 2019 Crypto Library Crypto Library Cobalt on N7021 VA Security Target Lite, Rev. 2.3, June 5th 2019 Protection Profile Conformance of the Platform Hardware Security IC Platform Protection Profile with Augmentation Packages, Version 1.0, Registered and Certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under the reference BSI-CC-PP-0084-2014 Sponsor and Developer TÜBİTAK BİLGEM UEKAE Evaluation Facility TÜBİTAK BİLGEM TDBY OKTEM Certification Scheme TSE CCCS 2.2. Security Policy Organizational Security Policies are; • P.Manufact (Manufacturing of the MRTD’s chip) The Initialization Data are written by the IC Manufacturer to identify the IC uniquely and to provide the keys for the authentication of the travel document Manufacturer. The travel document Manufacturer writes the Pre-Personalization Data which contains at least the Personalization Agent key, the Chip Authentication public. The eMRTD Manufacturer is an agent authorized by the Issuing State or Organization only. • P.Pre-Operational (Pre-Operational Handling of the travel document) BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 11 / 23 The travel document Issuer issues the travel document and approves it using the terminals complying with all applicable laws and regulations. The eMRTD Issuer guarantees correctness of the user data (amongst other of those, concerning the travel document holder) and of the TSF-data permanently stored in the TOE. The travel document Issuer uses only such TOE’s technical components (IC) which enable traceability of the travel documents in their manufacturing and issuing life cycle phases, i.e., before they are in the operational phase. If the travel document issuer authorises a Personalization Agent to personalise the travel document for travel document holders, the travel document Issuer has to ensure that the Personalization Agent acts in accordance with the eMRTD Issuer’s policy. • P.Card_PKI (PKI for Passive Authentication) The travel document Issuer shall establish a public key infrastructure for the passive authentication, i.e., for digital signature creation and verification for the travel document. For this aim, he runs a Country Signing Certification Authority (CSCA). The eMRTD Issuer shall publish the CSCA Certificate (CCSCA). The CSCA shall securely generate, store and use the CSCA key pair. The CSCA shall keep the CSCA Private Key secret and issue a self-signed CSCA Certificate (CCSCA) having to be made available to the travel document Issuer by strictly secure means. The CSCA shall create the Document Signer Certificates for the Document Signer Public Keys (CDS) and make them available to the travel document Issuer. A Document Signer shall (i) generate the Document Signer Key Pair, (ii) hand over the Document Signer Public Key to the CSCA for certification, (iii) keep the Document Signer Private Key secret and (iv) securely use the Document Signer Private Key for signing the Document Security Objects of travel documents. • P.Trustworthy_PKI (Trustworthiness of PKI) The CSCA shall ensure that it issues its certificates exclusively to the rightful organisations (DS) and DSs shall ensure that they sign exclusively correct Document Security Objects to be stored on the travel document. • P.Terminal (Abilities and trustworthiness of terminals) The Basic Inspection Systems with PACE (BIS-PACE) shall operate their terminals as follows: BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 12 / 23 The related terminals (basic inspection system, cf. above) shall be used by terminal operators and by travel document holders. They shall implement the terminal parts of the PACE protocol, of the Passive Authentication and use them in this order. The PACE terminal shall use randomly and (almost) uniformly selected nonces, if required by the protocols (for generating ephemeral keys for Diffie- Hellman). The related terminals need not to use any own credentials. They shall also store the Country Signing Public Key and the Document Signer Public Key (in form of CCSCA and CDS) in order to enable and to perform Passive Authentication (determination of the authenticity of data groups stored in the travel document). The related terminals and their environment shall ensure confidentiality and integrity of respective data handled by them (e.g., confidentiality of PACE passwords, integrity of PKI certificates, etc.), where it is necessary for a secure operation of the TOE according to the current ST. • P.Sensitive_Data (Privacy of sensitive biometric reference data) The biometric reference data of finger(s) (EF.DG3) and iris image(s) (EF.DG4) are sensitive private personal data of the travel document holder. The sensitive biometric reference data can be used only by inspection systems which are authorized for this access at the time the travel document is presented to the inspection system (Extended Inspection Systems). The issuing State or Organisation authorizes the Document Verifiers of the receiving States to manage the authorization of inspection systems within the limits defined by the Document Verifier Certificate. The travel document’s chip shall protect the confidentiality and integrity of the sensitive private personal data even during transmission to the Extended Inspection System after Chip Authentication Version 1. • P.Personalization (Personalization of the travel document by issuing State or Organization only) The issuing State or Organisation guarantees the correctness of the biographical data, the printed portrait and the digitized portrait, the biometric reference data and other data of the logical travel document with respect to the travel document holder. The personalization of the travel document for the holder is performed by an agent authorized by the issuing State or Organisation only. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 13 / 23 2.3. Assumptions and Clarification of Scope Assumptions for the operational environment of the TOE are; • A.Passive_Auth (PKI for Passive Authentication) The issuing and receiving States or Organizations establish a public key infrastructure for passive authentication, i.e., digital signature creation and verification for the logical travel document. The issuing State or Organization runs a Certification Authority (CA) which securely generates, stores and uses the Country Signing CA Key pair. The CA keeps the Country Signing CA Private Key secret and is recommended to distribute the Country Signing CA Public Key to ICAO, all receiving States maintaining its integrity. The Document Signer: i. generates the Document Signer Key Pair, ii. hands over the Document Signer Public Key to the CA for certification, iii. keeps the Document Signer Private Key secret and iv. uses securely the Document Signer Private Key for signing the Document Security Objects of the travel documents. The CA creates the Document Signer Certificates for the Document Signer Public Keys and distributes them to the receiving States and Organizations. It is assumed that the Document Security Object contains only the hash values of the genuine user data. • A.Insp_Sys (Inspection Systems for global interoperability) The Extended Inspection System (EIS) for global interoperability (i) includes the Country Signing CA Public Key and (ii) implements the terminal part of PACE and/or BAC. BAC may only be used if supported by the TOE. If both PACE and BAC are supported by the TOE and the IS, PACE must be used. The EIS reads the logical eMRTD under PACE or BAC and performs the Chip Authentication v.1 to verify the MRTD and establishes secure messaging. EIS supports the Terminal Authentication Protocol v.1 in order to ensure access control and is authorized by the issuing State or Organisation through the Document Verifier of the receiving State to read the sensitive biometric reference data. • A.Auth_PKI (PKI for Inspection Systems) The issuing and receiving States or Organisations establish a public key infrastructure for card verifiable certificates of the Extended Access Control / Extended Access Protocol. The Country BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 14 / 23 Verifying Certification Authorities, the Document Verifier and Extended Inspection Systems hold authentication key pairs and certificates for their public keys encoding the access control rights. The Country Verifying Certification Authorities of the issuing States or Organisations sign the certificates of the Document Verifier and the Document Verifiers sign the certificates of the Extended Inspection Systems of the receiving States or Organisations. The issuing States or Organisations distribute the public keys of their Country Verifying Certification Authority to their travel document’s chip. 2.4. Architectural Information TOE will be in form of a paper book or plastic card with an embedded chip and possibly an antenna. It presents visual readable data including (but not limited to) personal data of the MRTD holder: • The biographical data on the biographical data page of the passport book/card, • The printed data in the Machine-Readable Zone (MRZ) that identifies the MRTD and • The printed portrait. For further information see Security Target. 2.5. Documentation Documents below are provided to the customer by the developer alongside the TOE; Name of Document Version Number Date Security Target of AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration V10 18.01.2021 AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration Admin and User Guide V8 20.01.2021 AKIS GEZGIN_N v1.0.1.0 BAC Configuration with Active Authentication SAC & EAC Configuration Admin and User Guide V5 20.01.2021 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 15 / 23 2.6. IT Product Testing During the evaluation, all evaluation evidences of TOE were delivered and transferred completely to CCTL by the developers. All the delivered evaluation evidences which include software, documents, etc. are mapped to the assurance families Common Criteria and Common Methodology; so the connections between the assurance families and the evaluation evidences has been established. The evaluation results are available in the final Evaluation Technical Report (ETR) of AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration. It is concluded that the TOE supports EAL 5+ (ALC_DVS.2, AVA_VAN.5). There are 30 assurance families which are all evaluated with the methods detailed in the ETR. IT Product Testing is mainly described in two parts: 2.6.1.Developer Testing Developer has prepared TOE Test Document according to the TOE Functional Specification documentation, TOE Design documentation which includes TSF subsystems and its interactions. All SFR- Enforcing TSFIs have been tested by developer. Developer has conducted 447 functional tests in total. 2.6.2.Evaluator Testing • Independent Testing: Evaluator has chosen 35 developer tests to conduct by itself. Additionally, evaluator has prepared 21 independent tests. TOE has passed all 56 functional tests to demonstrate that its security functions work as it is defined in the ST. • Penetration Testing: TOE has been tested against common threats and other threats surfaced by vulnerability analysis. As a result, 23 penetration tests have been conducted. 2.7. Evaluated Configuration The evaluated TOE configuration is composed of; • the IC Embedded Software including operating system and eMRTD application (AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration), BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 16 / 23 • Secure IC (NXP Technologies, SmartMX3 P71D320P), • the IC Dedicated Software with the parts IC Dedicated Test Software and IC Dedicated Support Software, • Guidance documents 2.8. Results of the Evaluation The table below provides a complete listing of the Security Assurance Requirements for the TOE. These requirements consists of the Evaluation Assurance Level 5 (EAL 5) components as specified in Part 3 of the Common Criteria, augmented with ALC_DVS.2 and AVA_VAN.5. Assurance Class Component Component Title Development ADV_ARC.1 Security Architecture Description ADV_FSP.5 Complete semi-formal functional specification with additional error information ADV_IMP.1 Implementation representation of the TSF ADV_INT.2 Well-structured internals ADV_TDS.4 Semiformal Modular Design ADV_COMP.1 Design compliance with the platform certification report, guidance and ETR_COMP Guidance Documents AGD_OPE.1 Operational User Guidance AGD_PRE.1 Preparative Procedures AGD_COMP.1 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 17 / 23 Life-Cycle Support ALC_CMC.4 Production Support, Acceptance Procedures and automation ALC_CMS.5 Development tools CM coverage ALC_DEL.1 Delivery Procedures ALC_DVS.2 Sufficiency of security measures ALC_LCD.1 Developer defined life-cycle model ALC_TAT.2 Compliance with implementation standards ALC_COMP.1 Integration of the application into the underlying platform and Consistency check for delivery and acceptance procedures Security Target Evaluation ASE_CCL.1 Conformance Claims ASE_ECD.1 Extended Components Definition ASE_INT.1 ST Introduction ASE_OBJ.2 Security Objectives ASE_REQ.2 Derived Security Requirements ASE_SPD.1 Security Problem Definition ASE_TSS.1 TOE Summary Specification ASE_COMP.1 Consistency of Security Target BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 18 / 23 Tests ATE_COV.2 Analysis of Coverage ATE_DPT.3 Testing: Modular Design ATE_FUN.1 Functional Testing ATE_IND.2 Independent Testing - Sample ATE_COMP.1 Composite product functional testing Vulnerability Analysis AVA_VAN.5 Advanced Methodical Vulnerability Analysis AVA_COMP.1 Composite product vulnerability assessment The Evaluation Team assigned a Pass, Fail, or Inconclusive verdict to each work unit of each EAL 4+ (ALC_DVS.2) assurance component. For Fail or Inconclusive work unit verdicts, the Evaluation Team advised the developer about the issues requiring resolution or clarification within the evaluation evidence. In this way, the Evaluation Team assigned an overall Pass verdict to the assurance component only when all of the work units for that component had been assigned a Pass verdict. So for TOE “AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration”, the results of the assessment of all evaluation tasks are “Pass”. 2.9. Comments / Recommendations It is recommended that all guidance outlined in the Guidance Documents be followed and all assumptions are fulfilled in order to the secure usage of the TOE. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 19 / 23 3. SECURITY TARGET The Security Target associated with this Certification Report is identified by the following terminology: Title: Security Target of AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration Version: 10 Date of Document: 18.01.2021 A public version has been created and verified according to ST-Santizing: Title: Security Target Lite of AKIS GEZGIN_N v1.0.1.0 SAC&EAC Configuration Version: 02 Date of Document: 18.01.2021 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 20 / 23 4. GLOSSARY AA : Active Authentication ADV : Assurance of Development AES : Advanced Encryption Standard AGD : Assurance of Guidance Documents AKIS : Akıllı Kart İşletim Sistemi ALC : Assurance of Life Cycle ASE : Assurance of Security Target Evaluation ATE : Assurance of Tests Evaluation AVA : Assurance of Vulnerability Analysis BAC : Basic Access Control BİLGEM : Bilişim ve Bilgi Güvenliği İleri Teknolojiler Araştırma Merkezi CC : Common Criteria (Ortak Kriterler) CCCS : Common Criteria Certification Scheme (TSE) CCRA : Common Criteria Recognition Arrangement CCTL : Common Criteria Test Laboratory CEM :Common Evaluation Methodology CMC : Configuration Management Capability CMS : Configuration Management Scope BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 21 / 23 DEL : Delivery DES : Data Encryption Standard DF : Dedicated File DVS : Development Security EAC : Extended Access Control EAL : Evaluation Assurance Level EF : Elementary File ICAO : International Civil Aviation Organization MAC : Message Authentication Code MRTD: Machine Readable Travel Document OKTEM : Ortak Kriterler Test Merkezi OPE : Opretaional User Guidance OSP : Organisational Security PolicyPP : Protection Profile PRE : Preperative Procedures PP : Protection Profile SAC : Supplemental Access Control SAR : Security Assurance Requirements SFR : Security Functional Requirements ST : Security Target TOE : Target of Evaluation BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 22 / 23 TSF : TOE Secırity Functionality TSFI : TSF Interface TUBİTAK : Türkiye Bilimsel ve Teknolojik Araştırma Kurumu UEKAE : Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü 5. BIBLIOGRAPHY [1] Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5, April 2017, [2] Common Methodology for Information Technology Security Evaluation, CEM, Version 3.1 Revision 5, April 2017, [3] Composite product evaluation for Smart Cards and similar devices, v1.5.1, May 2018 [4] Application of Attack Potential to Smartcards, v2.9, May 2013 [5] DTR 75 TR 01 AKiS GEZGiN_N v1.0.1.0 SAC&EAC Configuration EAL5+ (ALC_DVS.2, AVA_VAN.5) Evaluation Technical Report Rev1.0 [6] 0977-v2_ETR-COMP_170630_v2 Evaluation Technical Report for Composite Evaluation (ETR COMP), v7, June 30th 2017 [7] 1019-v2_ETR-COMP_171020_v2 Evaluation Technical Report for Composite Evaluation (ETR COMP), v7, October 20th 2017 [8] Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Extended Access control, BSI-PP-0056-V2-2012, version 1.3.2, December 5th 2012 [9] Security IC Protection Profile, BSI-PP-0035, version 1.0, June 15th 2007 [10] ICAO Doc 9303, Machine Readable Travel Documents, Part 1 – Machine Readable Travel Passports, Sixth Edition, 2006, ICAO BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 23 / 23 [11] Technical Guideline TR-03110-3 Advanced Security Mechanisms for Machine Readable Travel Documents, Part 3: Common Specifications, Version 2.10, March 10th 2012 6. ANNEXES There is no additional information which is inappropriate for reference in other sections