: &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 1 / 83 SECURITY TARGET FOR THE MORPHO-CITIZ 32 CARD PHILIPS COMPONENT Common Criteria version 2.2 Augmented EAL 4 (ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4) Public Version Courtesy translation Version 1.1 2007  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 2 / 83  7$%/(2)&217(176   ,1752'8&7,212)7+(6(&85,7<7$5*(7   1.1 IDENTIFICATION OF THE SECURITY TARGET ..................................................................................................... 4 1.2 OVERALL VIEW OF THE SECURITY TARGET....................................................................................................... 4 1.3 CC COMPLIANCE.......................................................................................................................................... 5 1.4 DOCUMENT ORGANISATION............................................................................................................................ 5 1.5 REFERENCE DOCUMENTS.............................................................................................................................. 6 1.6 TERMINOLOGY.............................................................................................................................................. 6 1.7 GLOSSARY ................................................................................................................................................... 9  72('(6&5,37,21   2.1 PRODUCT TYPE .......................................................................................................................................... 10 2.1.1 Embedded Software Architecture ..................................................................................................... 10 2.1.2 Services of the IAS-eGOV application .............................................................................................. 11 2.1.3 Functional Blocks .............................................................................................................................. 12 2.2 PRODUCT LIFE CYCLE.................................................................................................................................. 15 2.3 TOE PRESENTATION .................................................................................................................................. 17 2.3.1 TOE Limits......................................................................................................................................... 17 2.3.2 TOE Description ................................................................................................................................ 18 2.4 THE TOE ENVIRONMENT............................................................................................................................. 20 2.4.1 Description of its environment:.......................................................................................................... 20 2.4.2 TOE logical phases ........................................................................................................................... 20 2.5 USERS AND ROLES...................................................................................................................................... 20 2.5.1 "Generic" Users................................................................................................................................. 21 2.5.2 Protected electronic signature: Users ............................................................................................... 21  7+(72(6(&85,7<(19,5210(17  3.1 THE PROPERTY TO BE PROTECTED ............................................................................................................... 22 3.1.1 Functions of the IAS-eGOV application ............................................................................................ 22 3.1.2 User data........................................................................................................................................... 23 3.1.3 TSF data............................................................................................................................................ 23 3.1.4 Protected electronic signature: Definition of SSCD property ............................................................ 23 3.2 HYPOTHESES.............................................................................................................................................. 24 3.2.1 Hypotheses defined in [R15 – CLST]................................................................................................ 24 3.2.2 Hypotheses defined in [R2 – 9911]................................................................................................... 24 3.2.3 Hypotheses defined in [R3 – SSCD T2] and [R4 – SSCD T3].......................................................... 25 3.3 THREATS .................................................................................................................................................... 26 3.3.1 Threats defined in [R15 – CLST]....................................................................................................... 26 3.3.2 Threats defined in [R2 – 9911].......................................................................................................... 27 3.3.3 Threats defined in [R3 – SSCD T2] and [R4 – SSCD T3]................................................................ 30 3.4 ORGANIZATIONAL SECURITY POLICIES........................................................................................................... 31 3.4.1 Policies defined in [R15 – CLST] ...................................................................................................... 31 3.4.2 Policies defined in [R3 – SSCD T2] and [R4 – SSCD T3] ................................................................ 32  6(&85,7<*2$/6   4.1 TOE SECURITY GOALS............................................................................................................................... 33 4.1.1 Security Goals defined in [R15 – CLST] ........................................................................................... 34 4.1.2 Security Goals defined in [R2 – 9911]............................................................................................... 34 4.1.3 Security Goals defined in [R3 – SSCD T2] and [R4 – SSCD T3] ..................................................... 35 4.2 SECURITY GOALS FOR THE TOE ENVIRONMENT ........................................................................................... 36 4.2.1 Objectives for the TOE environment defined in [R15 – CLST] ......................................................... 37 4.2.2 Security Goals for the TOE environment as defined in [R2 – 9911]. ............................................... 37 4.2.3 Security Goals for the TI environment of the TOE ............................................................................ 38  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 3 / 83  ,76(&85,7<5(48,5(0(176  5.1 SUBJECTS, OBJECTS AND TOE SECURITY ATTRIBUTES ................................................................................. 41 5.1.1 List of TOE subjects .......................................................................................................................... 41 5.1.2 List of TOE objects............................................................................................................................ 41 5.1.3 List of TOE security attributes ........................................................................................................... 41 5.1.4 Security attributes defined in [R3 – SSCD T2] and [R4 – SSCD T3]................................................ 42 5.2 DEFINITION OF TOE FUNCTIONAL SECURITY REQUIREMENTS ........................................................................ 42 5.2.1 FAU Security Audit............................................................................................................................ 42 5.2.2 FCS Cryptographic Support .............................................................................................................. 43 5.2.3 FDP User data protection.................................................................................................................. 45 5.2.4 Identification and authentification (FIA)............................................................................................. 59 5.2.5 FMT Security Management............................................................................................................... 62 5.2.6 (FPR) Protection of privacy ............................................................................................................... 66 5.2.7 Protection of TOE (FPT) security functions....................................................................................... 66 5.2.8 Web and Channels of Trust (FTP) .................................................................................................... 70 5.2.9 Resource Utilization FRU.................................................................................................................. 71 5.3 TOE SECURITY INSURANCE REQUIREMENTS ................................................................................................ 71 5.4 EXTENSION OF FUNCTIONAL SECURITY REQUIREMENTS................................................................................. 74 5.5 IT ENVIRONMENT SECURITY REQUIREMENTS ................................................................................................ 74 5.5.1 TI environment security requirements stemming from [R15 – CLST]............................................... 74 5.5.2 IT environment security requirements stemming from the SSCD profile.......................................... 75 5.6 NON TI ENVIRONMENT SECURITY REQUIREMENTS......................................................................................... 77 5.6.1 Non TI environment security Requirements stemming from [R3 – SSCD T2] and [R4 – SSCD T3] 77 5.6.2 Non TI environment security requirements stemming from [R15 – CLST] ....................................... 78  72(*(1(5$/63(&,),&$7,216   6.1 COMPONENT LEVEL SECURITY FUNCTIONS ................................................................................................... 79 6.2 LOW LEVEL SECURITY FUNCTIONS................................................................................................................ 79 6.3 OS LEVEL SECURITY FUNCTIONS ................................................................................................................. 79 6.4 CRYPTO LIBRARY LEVEL SECURITY FUNCTIONS ............................................................................................. 80 6.5 APPLICATION MANAGER LEVEL SECURITY FUNCTIONS.................................................................................... 81 6.6 APPLICATIVE LEVEL SECURITY FUNCTIONS.................................................................................................... 81  33&203/,$1&(127,&(  7.1 PP REFERENCE.......................................................................................................................................... 83 7.2 PP ADDITIONS............................................................................................................................................ 83  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 4 / 83  ,1752'8&7,212)7+(6(&85,7<7$5*(7  ,'(17,),&$7,212)7+(6(&85,7<7$5*(7  'RFXPHQW,GHQWLILFDWLRQ 7LWOH  Lite Security target Morpho-Citiz 32 card – Component PHILIPS 9HUVLRQ  1.1 6HFXULW\7DUJHW,GHQWLILHU  SK-0000053756 72(,GHQWLILFDWLRQ &RPSRQHQW,GHQWLILHU  PHILIPS Component: P5CC036V1 – Rev D 0DVNHG&RPSRQHQW,GHQWLILHU  MC32/P5CC036V1D/1.0.0 8VHU*XLGH  SK-0000051481 – 1.01 – MC32 - User Guide $GPLQLVWUDWRU*XLGH  SK-0000051475 – 1.01 – MC32 - Administrator Guide ,QVWDOODWLRQDQG6WDUW8S*XLGH  SK 0000051482 – 1.2 – Installation Procedure 'HOLYHU\*XLGH  SK-0000057043 - 1.01 - PHILIPS Delivery Procedure  &&&RPSOLDQFH $VVXUDQFH/HYHO  EAL4 augmented by assurance components ADV_IMP.2, ALC_DVS.2, AVA_MSU.3 and AVA_VLA.4. )XQFWLRQ5HVLVWDQFH/HYHO  SOF – High &&9HUVLRQ  2.2 &RPSRQHQW&HUWLILFDWH  BSI-DSZ-CC-0293-2005 &U\SWR/LEUDULDQ&HUWLILFDWH  BSI-DSZ-CC-0296-2006  29(5$//9,(:2)7+(6(&85,7<7$5*(7 This security target specifies the functional and security assurance requirements applicable to the electronic administration application in compliance with IAS of the Morpho-Citiz 32 card referred to hereafter as the IAS- eGOV application . The TOE described in the framework of this security target is composed of embedded software on a component type smart card, reference P5CC036V1, with a cryptographic library called "Crypto Library on SmartMX." The reference component P5CC036V1 and the cryptographic library "Crypto Library on SmartMX“ were assessed separately: - The component reference P5CC036V1 was assessed according to the protection profile >5 ± %6,@ and has received reference certificate BSI-DSZ-CC-0293-2005. - The cryptographic library "Crypto Library on SmartMX“ on component P5CC036V1 has received reference certificate BSI-DSZ-CC-0296-2006. The assessment of the TOE is thus a composition of the assessment of the embedded software on component P5CC036V1 with the library “Crypto Library on SmartMX.”  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 5 / 83 In its operating environment, IAS-eGOV application performs the electronic administration services as defined in documents >5±$5($.@ and >5±$5($.@. The IAS-eGOV application is an electronic administration (e-administration) development support through the available services responding essentially to the new needs of the electronic administration (as defined by the AEAD). Within the framework of electronic administration contexts, IAS-eGOV application offers electronic signature services responding to the characteristics of a secure signature creation device (SSCD) that allow the implementation of so-called “qualifying,” certificates. This security target thus specifies the functional security requirements and the security assurance requirements applicable to “secure” electronic signature services of the IAS-eGOV application. In its operating environment, the IAS-eGOV application performs the secure electronic signature services in compliance with the European directive >5 ± 'LUHFWLYH@ transcribed in protection profile >5 ± 66&' 7@. These functions are: − Generation of an electronic signature bi-key (SCD/SVD); − Destruction of the electronic signature bi-key (SCD/SVD); − Loading of electronic signature private key (SCD); − Electronic signature creation. The assurance level specified in the present security target and in its documentation is EAL 4 augmented by assurance components ADV_IMP.2, ALC_DVS.2, AVA_MSU.3 and AVA_VLA.4. The resistance level for functional security requirements is “high” (High SOF).  &&&203/,$1&( This security target complies with Common Criteria V2.2 >5±&&@. This security target complies with protection profile >5±66&' 7@ and >5 ±66&' 7@. It is also based on protection profile >5±@ and on the target >5±&/67@. The security target is in itself compliant with part 2 of the Common Criteria V2.2 expanded by requirement FPT_EMSEC defined in protection profiles >5±66&'7@ and >5±66&'7@, by requirement FCS_RND.1 defined in protection profile >5±%6,@ and by requirements FCS_RND.2 and FPT_TST.2 defined in target >5±&/67@. The security target is in compliance with part 3 of the CC.  '2&80(1725*$1,6$7,21 The present security target is organized in 8 chapters in the following manner: &KDSWHU Present introduction; &KDSWHU General description of the TOE providing general information on the TOE that allows for introduction of the choices regarding security requirements; &KDSWHU Presentation of the TOE security environment in which the TOE is used. It particularly describes  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 6 / 83 the property to protect, the users intervening on the TOE, the assumptions as well as the applicable threats and the organizational security policies; &KDSWHU Presentation of security objectives satisfied by the TOE in its operating environment. &KDSWHU Presentation of the security requirements satisfied by the TOE and its environment, in terms of functional requirements on the one hand and security assurance requirements on the other; &KDSWHU Presentation of the general definitions of the security functions and assurance measures implemented by the TOE responding to the functional and assurances requirements; &KDSWHU Presentation of existing protection profiles to which the present security target refers;  5()(5(1&('2&80(176 >5±&&@ Common Criteria for Information Technology Security Evaluation- Version 2.2, January 2004. >5±@ Eurosmart Protection Profile, Smart Card Integrated Circuit With Embedded Software, PP/9911, v2.0, June 1999 >5±66&'7@ Protection Profile — Secure Signature-Creation Device Type 2, Version: 1.04, 25 July 2001. >5±66&'7@ Protection Profile — Secure Signature-Creation Device Type 3, Version: 1.05, 25 July 2001. >5±%6,@ Protection Profile, Smart card IC Platform Protection Profile Version 1.0 July 2001 >5±'LUHFWLYH@ DIRECTIVE 1999/93/EC of the EUROPEAN PARLIAMENT and COUNCIL of 13 December 1999 on a community framework for electronic signatures. >5±$OJR@ Algorithms and parameters of the algorithms, list of the algorithms and parameters eligible for the electronic signatures as defined in the directive 1999/93/EC, article 9 on the “Committee on Electronic Signatures” of the Directive. >5±,3$@ SK - 0000020920 – 1.23 –Functional specifications of the IPA application SK 0000053628 - Addendum to the Functional specifications of the IPA application >5±($'0,1@ SK 0000020918 – 1.19 – Specification of the E-ADMINISTRATION application >5±$5($.@ CWA 14890-1: Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic requirements – April 2004 (AREA-K-1) >5±$5($.@ CWA 14890-2: Application Interface for smart cards used as Secure Signature Creation Devices - Part 2: Additional Services – May 2004 (AREA-K-2) >5±±@ ISO/IEC 7816 – 4: Identification cards Integrated circuits cards with contacts Part 4 – Inter-industry commands for interchange >5± (55$780@ eADMINISTRATION Common Platform Technical Specification: Erratum to version 1.01 >5±+:67@ Security Target, BSI-DSZ-CC-0293, Evaluation of the P5CC036VID Secure Smart Card Controller, Version 1.0 – March 18 th , 2005 >5±&/67@ Security Target lite, BSI-DSZ-CC-0296, Evaluation of the Secured Crypto Library on the P5CC036VID, Version 2.1.0 – December 6 th , 2005  7(50,12/2*<   $GPLQLVWUDWRU  A user who performs the initialisation of the target of evaluation (TOE), the personalization of the TOE or other TOE administrative functions. 6LJQDWXUH&UHDWLRQ $SSOLFDWLRQ 6&$   Application used for creating an electronic signature, with exception to SSCD, i.e., the SCA is a group of application elements used for: (a) Performing the DTBS presentation to the signatory prior to the signing process according to the signatory’s decision; (b) Sending representation of the DTBS to the TOE if the signatory indicates his intention to sign by an entry or a non-interpretable action; (c) Attach the qualified electronic signature generated by the TOE to the data or to provide the qualified electronic signature as separate data. &HUWLILFDWLRQ*HQHUDWLRQ $SSOLFDWLRQ &*$   A group of application elements that request the data pertaining to the verification of the signature through SSCD for generation of the qualifying certificate. The CGA requests the generation of a corresponding SCD/SVD  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 7 / 83 pair by the SSCD if the SVD requested have yet to be generated by the SSCD. The CGA verifies the authenticity of the SVD by (a) proof of the correspondence SSCD between the SCD and the SVD and; (b) a verification by the issuer and of the integrity of the SVD received. 6HFXULW\$WWULEXWH  Information associated with subjects, users or objects, that is used for TSP application. 6LJQDWXUH$WWULEXWHV  Supplementary information that is signed at the same time as the user message. 3URSHUW\  Information or resources to be protected by the counter-measures of a TOE. &HUWLILFDWH  Electronic certificate binding SVD to a person and confirming this latter’s identity (defined in the Directive [1], article 2.9). 4XDOLI\LQJ&HUWLILFDWH  Certificate that fulfils requirements targeted at annexe I of the Directive [1] and provided by a CSP that fulfils requirements targeted annexe II of the Directive [1]. (defined in Directive [1], article 2.10) 7DUJHWRIHYDOXDWLRQ 72(   A product or IT system and the associated documentation for the administrator and for the user who is concerned by an assessment. 6HFXULW\WDUJHW 67   A group of security requirements and specifications to be used as a basis for assessing an identified TOE. 'LUHFWLYH  The 1999/93/EC directive of the European Parliament and Council of 13 December 1999 on a community framework for electronic signatures [1] is also named the ‘Directive’ in the rest of the PP. 6HFXUH6LJQDWXUH&UHDWLRQ 'HYLFH 66&'   Software device or material configured for applying SCD and that satisfies the requirements set forth in Annexe III of the Directive [1]. (defined in Directive [1], articles 2.5 and 2.6). 5HIHUHQFH$XWKHQWLILFDWLRQ 'DWD 5$'   Data permanently stored by the TOE for verification of the tentative authentification as an authorized user. 6LJQDWXUH&UHDWLRQ'DWD 6&'   Unique data, such as private codes or cryptographic keys, that the signatory uses for creating an electronic signature (defined in Directive [1], article 2.4). 6LJQDWXUH9HULILFDWLRQ'DWD 69'   Data, such as public codes or cryptographic keys, that are used for verifying the electronic signature (defined in the Directive [1], article 2.7). $XWKHQWLILFDWLRQ'DWD  Information used for verifying the identity announced by a user. 9HULILFDWLRQ$XWKHQWLILFDWLRQ 'DWD 9$'   Authentification data provided upon entry by the user or authentification data derived from the user’s biometric characteristics. 'DWD7R%H6LJQHG '7%6   Electronic data to be signed (including both the user message and the signature attributes). 76)'DWD 76)GDWD   Data created by and for the TOE, that may affect TOE functioning. 8VHU'DWD 8VHU'DWD   Data created by and for the user, that does not affect TSF functioning. ,QYDOLGDWLRQ  If a subject or an object is invalidated, it is no longer available in the system. It is logically destroyed. 2EMHFW  Entity upon which a subject performs operations. When a subject is the target of an operation, it is seen as an object. 6LJQHG'DWD2EMHFW 6'2   Electronic data to which the electronic signature was logically attached or associated as an authentification method. &HUWLILFDWLRQ6HUYLFH 3URYLGHUV &63   Any entity or natural person or legal entity that delivers certificates or provides other services related to electronic signatures (defined in the Directive [1], article 2.11). 5HILQHPHQW  The addition of details to a component. 6SHFLDO)XQFWLRQV5HJLVWHUV  The registers used for accessing and configuring the functions for communication with an external interface, the cryptographic co-processor for the Triple-DES, the FameXE co-processor for the basic arithmetic functions for executing the asymmetrical cryptographic functions, the RNG and the chip configuration. 5HSUHVHQWDWLRQRIWKHGDWDWR EHVLJQHG 5HSUHVHQWDWLRQRI WKH'7%6   Data sent by the SCA to the TOE for signature and bearing: (a) A DTBS hash value or; (b) An intermediate hash value of a first DTBS portion and a remaining  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 8 / 83 DTBS portion or; (c) The DTBS. The SCA indicates to the TOE the case of DTBS representation notwithstanding implicit indication. The hash value in case (a) or the intermediate hash value of case (b) is calculated by the SCA. The hash value in case (b) or the intermediate hash value of case (c) is calculated by the TOE. 8VHU5ROH  Defines the rights that are associated to a user shouldering a given role. The user is authentified according to his role. 6HFUHW  Cryptographic keys or reference value for authentifying a user based on the verification of their PIN Code (i.e. RAD) 66&'6XSSO\6HUYLFH  A service that prepares and provides an SSCD to its members. 6LJQDWRU\  A person that holds an SSCD and who acts either on their own behalf or that of the legal entity or natural person that they represent (defined in Directive [1], article 2.3). $GYDQFHG(OHFWURQLF 6LJQDWXUH  (defined in directive [1], article 2.2). An electronic signature that fulfils the following requirements, it: (a) is linked solely to the signatory; (b) allows for signatory identification; (c) is created by means that the signatory may keep under his exclusive control; (d) is linked to data to which it is linked in such a way that any subsequent data modification shall be detectable. 4XDOLILHGHOHFWURQLFVLJQDWXUH  An advanced signature based on a qualified certificate and created by a secure signature creation device in compliance with Directive [1], article 5, paragraph 1. 62)+LJK 62)KLJK   A level of the resistance of a TOE function such as the analysis displays that the function concerned provides adequate protection from a deliberately planned or organized TOE security violation by attackers with a high attack potential. 6XEMHFW  An active entity performing operations on the objects for the benefit of a user or as part of the TOE. 6LJQDWXUH&UHDWLRQ6\VWHP 6&6   A comprehensive system that creates an electronic signature. The signature creation system is comprised of the SCA and the SSCD. 8VHU  An entity (human or external IT user entity) outside of the TOE that interacts with the TOE. 'RPDLQ$XWKRULW\  User responsible for administration of a domain in the file architecture of the Morpho-Citiz 32 card.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 9 / 83  */266$5< &$ : Certification Authority $($' : Agency for Electronic Administration Development $') : Application Directory File $55 : Access Rules References $3'8 : Application Protocol Data Unit $75 : Answer To Reset && : Common Criteria &*$ : Certification Generation Application &0'563 : Command / Response &63 : Certification Service Provider &9& : Certificate Verifiable by a Card '$& : Data Access Conditions '(6 : Data Encryption Standard ') : Directory File ')$ : Differential Fault Analysis '+ : Diffie-Helmann '3$ : Differential Power Analysis '51* : Deterministic RNG '7%6 : Data To Be Signed ($/ : Evaluation Assurance Level () : Elementary File (9 : Electronic Value )&, : File Control Information ,$6 : Identification Authentification Signature 0) : Master File 273 : One Time Programmable 3,1 : Personal Identification Number 5$' : Reference Authentication Data 51* : Random Number Generator 56$ : Rivest Shamir Adelman 62) : Strength of function 6&$ : Signature-Creation Application 6&' : Signature-Creation Data 6'2 : Signed Data Object 60 : Secure Messaging 63$ : Simple Power Analysis 66& : Secure Signature Creation 66&' : Secure Signature-Creation Device 67 : Security Target 69' : Signature-Verification Data ,7 : Information Technology 72( : Target Of Evaluation 76) : TOE Security Functions 763 : TOE Security Policy 9$' : Validation Authentication Data  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 10 / 83  72('(6&5,37,21  352'8&77<3( The Morpho-Citiz 32 card is a "smart card" type product composed of the following material and software elements: − Embedded software designed by Sagem Défense Sécurité. − An integrated circuit (IC) (dedicated material and software) designed by Philips Semiconductors Plc bearing reference P5CC036V1. This component was assessed according to German assessment methods and security certification of the information technology in compliance with protection profile >5 ± %6,@. The assurance level is EAL5 augmented by assurance requirements ALC_DVS.2, AVA_VLA.4 and AVA_MSU.3. The component security target is described in the document >5±+:67@. − A cryptographic library designed by the Philips Semiconductors Plc. This library is identified by the name “Crypto Library on SmartMX.” It is assessed according to German assessment methods and security certification of the information technology in compliance with protection profile >5±%6,@ and in composition with the component assessment. The assurance level is EAL4 augmented by assurance requirements ADV_IMP.2, ALC_DVS.2, AVA_VLA.4 and AVA_MSU.3. The cryptographic library security target is described in document >5±&/67@.  (PEHGGHG6RIWZDUH$UFKLWHFWXUH The embedded software on the Morpho-Citiz 32 card is broken down into software blocks that perform the following functions: − Data management functions ("user" and secrets data); − Management functions for handling "user" authentifications; − Management functions of secure electronic signature services; − Initialisation and personalization function of the Morpho-Citiz 32 card. The entire collection of block software is instantiated for performing the following applications: − The initialisation and personalization application of the >5 ± ,3$@ card (noted hereinafter as “IPA”) in compliance with specifications >5 ± ,3$@. This application is invalidated in the user phase; − The IAS-eGOV application is present on the Morpho-Citiz 32 card in user phase (phase 7), in compliance with >5±($'0,1@ specifications. It performs IAS type services responding to the electronic administration needs. The IAS-eGOV application may be instantiated several times; Finally, the application manager dispatches the commands towards the application concerned and maintains the security function in the use of the card’s functions between the various pending applications that solicit it. The general architecture of the Morpho-Citiz 32 card is displayed in Figure 1.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 11 / 83 0RUSKR&LWL]&DUG "Init & Perso Functions " Pre-perso/Perso Data Operating System Application Management "IAS-eGOV"ADF ,$6H*29 Application Data gathered by the IAS-eGov instances Data gathered from IAS-eGOV services IPA Application : Invalid post-issue : Applicative data Data Management Functions Electronic signature Functions Authentification Functions : Secured electronic signature functions )LJXUH'HVFULSWLRQRIWKHFDUG0RUSKR&LWL]DUFKLWHFWXUH  6HUYLFHVRIWKH,$6H*29DSSOLFDWLRQ The IAS-eGOV application performs bundle services via the commands in compliance with >5 ± ($'0,1@ available solely in the user phase. The access to these services depends upon the user’s role, the condition of the Morpho-Citiz 32 card and the condition of the application performing the service. 8VHU'DWD0DQDJHPHQW6HUYLFH This service is performed by the IAS-eGOV application on the data managed by the application. It performs all data management operations and manages the secrets accessible to an authorized user by relying on functions described in chapter 2.1.3. 8VHU$XWKHQWLILFDWLRQ6HUYLFH This service is performed by the IAS-eGOV application on data managed by the application. The IAS-eGOV application performs the authentification service by relying on the authentification functions described in chapter 2.1.3. 6HFXUH(OHFWURQLF6LJQDWXUH6HUYLFH This service is performed by IAS-eGOV application on the data managed by the application. In order to perform the secure electronic signature service, IAS-eGOV application relies on the secure electronic signature functions described in chapter 2.1.3.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 12 / 83  )XQFWLRQDO%ORFNV The following chapters describe the functions of the Morpho-Citiz 32 card that handle data management, electronic signature and authentification on behalf of the IAS-eGOV application.  'DWD0DQDJHPHQW Data stored on the Morpho-Citiz 32 card is organized in a tree of directories and files, in compliance with standard >5±±@. 2EMHFWVVXSSRUWHGE\WKH0RUSKR&LWL]FDUG The Morpho-Citiz 32 card supports the following objects: − 7KHGLUHFWRULHVDQGWKHILOHV creating the data structure; − 7KH7/9 REMHFWVcontained in the directories (in the same way as the files) but accessible by a name system; − 7KHVHFUHWVin which the cryptographic keys and the PIN codes are stored. $FFHVVWRREMHFWV Any object (directory, file, secret, TLV) subject to access conditions may only be accessed upon verification of these conditions. The verification of access conditions is performed by comparing the access conditions defined in the DAC of the object with the current status of the security card. Access conditions to an object are associated with authentification secrets (PIN Code, authentification key) or with the establishment of a channel of trust (SMC, SMI). Thus, when a user is authentified or a channel of trust is established, this information is memorized in the security card status. The security card status is updated when the user authentification is no longer valid or when the security canal is interrupted. 'DWD0DQDJHPHQW)XQFWLRQV Data management functions perform the management services of the data structure of the IAS-eGOV application. − 'LUHFWRU\ FUHDWLRQ: Allows directory creation (DF file type). − )LOHFUHDWLRQ: Allows the creation of EF type files. − 'LUHFWRU\GHOHWLRQ: Allows directory deletion (DF file type). − )LOHGHOHWLRQ: Allows EF file type deletion. − 0DQDJHPHQWRIDILOHGLUHFWRU\OLIHF\FOH Allows the authorized user to modify the status of a file/directory during its life cycle, except for MF. − 8SGDWH)LOH GDWDZULWLQJ: Allows writing of data into a selected file. − )LOHGDWDUHDGLQJ: Allows reading of data in a selected file. − &UHDWLRQRID7/9 Allows TLV creation. − 8SGDWH:ULWLQJRIGDWDLQD7/9: Allows writing and deletion of data in a selected TLV object. − 5HDGLQJRI7/9GDWDAllows reading of data in a selected TLV object. − /LIH F\FOH VHFUHWPDQDJHPHQW Allows the authorized user to modify the status of a secret in its life cycle.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 13 / 83 − 6HFUHW UHOHDVH Allows release of a PIN Code or a cryptographic key found in the "Blocked," state. − 6HFUHWFUHDWLRQ: Allows secret creation. − 8SGDWH6HFUHWZULWLQJ: Allows updating of a PIN Code or of a cryptographic key. − 5HDGLQJ RI LQIRUPDWLRQ OLQNHG WR D VHFUHW: Allows reading of information associated with a secret or to public keys. − %LNH\JHQHUDWLRQ: Allows generation of a bi-key for authentification, signature or asymmetrical confidentiality.  8VHU$XWKHQWLILFDWLRQ 1DWXUHRIWKHDXWKHQWLILFDWLRQ The authentification functions perform services of user authentification of the IAS-eGOV application User authentification is based on the role ensured by a user when accessing application services. User authentification operations are performed according to different types of secrets associated with the supported roles, i.e.: − A so-called "PIN authentification code” for authentifying the bearer for access to data and to the creation of a qualified electronic signature; − A so-called "PUK authentification code” for authentifying the user for the deblocking operation of the PIN Code to which the PUK code is associated; − A symmetrical key for authentifying the user (without SM implementation) that allows access to data management; − A symmetrical key (stored on the card) for mutual authentification allowing updating of card data via the establishment of a channel of trust; − A CVC type certificate + response to a challenge provided to the card that authentifies the user via the verification of the certificate from a card root key for accessing data management; − A CVC or X509 type certificate allowing card authentification; $XWKHQWLILFDWLRQIXQFWLRQV These are user authentification functions of the IAS-eGOV application These functions help resolve the access conditions of objects of the Morpho-Citiz 32 card. − 9HULILFDWLRQ RI WKH 3,1 &RGH38.: Allows authentification of the bearer or of the associated PUK code; − 0XWXDO V\PPHWULFDO DXWKHQWLILFDWLRQ: Allows mutual card/user authentification according to a symmetrical plan and based on the utilization of 112-bit TDES keys; − ([WHUQDO V\PPHWULFDODXWKHQWLILFDWLRQ: Allows the authentification of a user on the basis of 112 bit TDES keys; − 0XWXDODV\PPHWULFDO'+DXWKHQWLILFDWLRQ Allows mutual card/user authentification relying on a Diffie-Helmann (DH) protocol and based on CVC (RSA key up to 2048 bits) certificates; − ([WHUQDO DV\PPHWULFDODXWKHQWLILFDWLRQ: Allows user authentification based on CVC user certificates (RSA key up to 2048 bits);  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 14 / 83 − ,QWHUQDODV\PPHWULFDO DXWKHQWLILFDWLRQ: Allows card authentification based on a CVC or X509 1 "card” certificate (RSA key up to 2048 bits);  (OHFWURQLF6LJQDWXUH These functions create electronic signatures and manage data implemented within the framework of this electronic signature for the ,$6H*29DSSOLFDWLRQ user. 6&'69'0DQDJHPHQWIXQFWLRQV − SCD/SVD generation; − SCD/SVD destruction; − SCD loading, storage and utilization. 6LJQDWXUH)XQFWLRQV − Electronic signature creation TXDOLILHGVLJQDWXUHQRQTXDOLILHGVLJQDWXUH The Morpho-Citiz 32 card performs the electronic signature service according to two functioning modes: − The "qualified signature" mode for which compliance with protection profiles >5 ± 66&' 7@ and >5±66&'7@ is required; − The "non-qualified signature" mode for which the requirements concerning the utilization qualified certificates such as those defined in § 3.4.2 of the organizational policies are not applicable. Compliance with protection profiles >5±66&'7@ and >5±66&'7@ is thus not required; The mode is defined by the utilization framework of the Morpho-Citiz 32 card and especially at the time of its personalization, i.e. upon loading of the qualified- or non-qualified certificates.  &RQILGHQWLDOLW\±,QWHJULW\ 6HFXUH0HVVDJLQJFKDQQHORIWUXVWIXQFWLRQV Establishment of a channel of trust requires prior mutual authentification between the card and the IT product communicating with the card. This mutual authentification may be done via symmetrical (mutual) or asymmetrical authentification. The channel of trust functions perform the processes associated with the establishment and management of a channel of trust. This channel of trust supports the following services: − 60, ,QWHJULW\: Integrity on the commands and responses exchanged between the Morpho-Citiz 32 card and an IT product. − 60& &RQILGHQWLDOLW\: Confidentiality on the commands and the responses exchanged between the Morpho-Citiz 32 card and an IT product. On the basis of these two services, there are two protection modes on the CMD/RSP exchanged during a channel of trust session: − Integrity protection: SMI; − Integrity and confidentiality protection: SMI and SMC; 1 the X 509 certificates are used solely within a framework of card authentification for SSL sessions and are thus not interpreted by the Morpho-Citiz 32. card.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 15 / 83 &RQILGHQWLDOLW\)XQFWLRQV The Morpho-Citiz 32 card institutes encryption functions that protect the confidentiality of secrets and sensitive data. These functions are: − $V\PPHWULFDOVHFUHWGHFU\SWLRQ: Allows decryption of an encrypted secret with the help of an RSA secret decryption key; − 6\PPHWULFDO GDWDHQFU\SWLRQ: Allows data encrypting within the framework of an SM with the help of a TDES data encryption key; ,QWHJULW\IXQFWLRQ The Morpho-Citiz 32 card implements a calculation integrity function ensuring the integrity of secrets and sensitive data. This function uses MAC for calculating /verifying (MAC Retail) data integrity.  352'8&7/,)(&<&/( The life cycle corresponds to a "smart card” product life cycle. It is broken down into 7 phases: 3KDVH 'HYHORSPHQWRIWKHVPDUWFDUGHPEHGGHGVRIWZDUH 6DJHP'pIHQVH6pFXULWp is in charge of the development of the smart card integrated software and of the specification requirements for the initialization of the integrated circuit. 3KDVH ,QWHJUDWHG&LUFXLW ,& 'HYHORSPHQW 3KLOLSV6HPLFRQGXFWRUV3OFdesigns the IC, develops the dedicated software IC and transmits the information, the software and the tools to the developer’s embedded software (6DJHP'pIHQVH6pFXULWp), by protected verification and delivery procedures. From the integrated circuit, the dedicated software and the embedded software, they build the integrated circuit smart card data base, indispensable for creating the integrated circuit mask. 3KDVH 0DQXIDFWXUHDQGWHVWRIWKHLQWHJUDWHGFLUFXLW 3KLOLSV 6HPLFRQGXFWRUV3OFis in charge of the production of the integrated circuit which occurs in three principal steps: manufacture, test and initialisation of the integrated circuit. 3KDVH (QFDSVXODWLRQDQGWHVWRIWKHLQWHJUDWHGFLUFXLW The LQWHJUDWHGFLUFXLW SDFNDJLQJPDQXIDFWXUHUin charge of packaging (encapsulation) and testing of the integrated circuit. 3KDVH 6PDUWFDUGSURGXFW)LQLVK The VPDUWFDUG PDQXIDFWXUHUin charge of finishing and testing the smart card. 3KDVH 6PDUWFDUGSHUVRQDOL]DWLRQ The SHUVRQDOL]HU is in charge of personalizing the smart card and performing final tests. 3KDVH 6PDUWFDUGXVH The VPDUWFDUGLVVXHUis in charge of product delivery to the HQG user, as well as for the end of the life cycle. The role of the embedded software designed in phase 1 is to check and protect the TOE during phases 4 to 7 (product use). The overall security requirements of the TOE stipulate that the threats posed in subsequent phases must be anticipated during the development phase. That is why this security target addresses the functions implemented in phases 4 to 7 but that remain developed during phase 1. Figure 2: The smart card product describes the smart card product life cycle.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 16 / 83  IC pre-personalization requirements Smart card embedded software  embedded software, pre-personalization data Sensitive data, IC, software, tools CIdesign Dedicated CI software Creation of the IC smart card database IC mask manufacture  IC manufacture IC pre-personalization tests  IC encapsulation Tests  Smart card product finishing process Tests   Personalization Tests   Final utilization of the smart card End of life cycle process Devlopment phase Production phase Product manufacture Product utilization : Protected delivery and verification procedures pre-personalizer requirements : Optional components  )LJXUH7KHVPDUWFDUGSURGXFWOLIHF\FOH The software and material module is designed during phases 1 to 3. However, the IAS-eGOV application is designed in phase 1. The development of the application includes the phases of specification, design, coding, testing and qualification. These different phases may be implemented in different places. Procedures must be set up for processing TOE delivery and must be applied within each phase as between each phase. This includes any form of delivery carried out from phase 1 through phase 6, including:  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 17 / 83 − Intermediate delivery of the TOE or of the TOE currently being manufactured within a given phase; − Delivery of the TOE or of the TOE currently being manufactured from one phase to the following phase; − Delivery of the code to the caster together with delivery of the initialisation and personalization parameters.  72(35(6(17$7,21 The target of evaluation (TOE) described in this chapter is the IAS-eGOV application. This TOE is referred to hereinafter as the "IAS-eGOV application"  72(/LPLWV The TOE is the IAS-eGOV application of the Morpho-Citiz 32 card. It is composed of the following elements: − The operating system; − The manager application; − The embedded software functions of the Morpho-Citiz 32 card implemented in the IAS-eGOV application services; The TOE is presented in the outline of the Figure 3. 72( Operating System Application Manager IAS e-GOV Application $'),$6H*29 All data from the IAS e-GOV bodies All data from the IAS e-GOV services : Applicative Data Data Management Functions Electronic Signature Functions Authentification Functions : Protected electronic signature functions )LJXUH6HUYLFHVRIWKH72(  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 18 / 83  72('HVFULSWLRQ The IAS-eGOV application ensures the services described in chapter 2.1.2 on the data managed by the application. The following data is linked to the IAS-eGOV application: − The collective data, especially the data to be signed and the certificates to be stored on the card; − All data pertaining to the cryptographic keys associated with the IAS-eGOV application services as well as the PIN code(s) used for authentifying the bearer and PUK code(s); − All data pertaining to the bearer’s identity; − "Card" Certificates; − The authentification card private key and the associated DH parameters; − The data linked to the physical support of the card such as the serial number; The IAS-eGOV application also performs the processing of protected electronic signatures, i.e.,: (1) Generation of the corresponding SCD and SVD or loading of SCD; (2) Creation of qualified signatures: a. after having allowed the data to be signed (DTBS) to be correctly displayed by the adapted environment; b. by using control functions that are, according to >5±$OJR@, declared as being adapted to qualified electronic signatures; c. after the signatory’s adapted authentification by the TOE; d. by using an adapted cryptographic signature function that uses adapted cryptographic parameters declared as such according to >5±$OJR@. The TOE preserves the secret of the SCDs. In order to avoid unauthorized SCD utilization, the TOE allows a user authentification and access control. The TOE employs IT measures for taking on a web of trust towards a protected human interface device. The TOE keeps the RAD for verifying the VAD provided by the signatory. The TOE is initialized for a utilization by the signatory when, as this latter may choose: (1) importing an SCD; (2) generating an SCD/SVD pair. Solely the legitimate signatory may utilize the SCD during the signature creation process and during the validity of the SCD/SVD pairs. The TOE stores the SCD and may export the SVD. The SVD corresponding to the signatory SCDs are included in the signatory’s certificate by the certification service providers (CSP). The TOE destroys the SCDs that are no longer used for generating signatures.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 19 / 83 In the user phase, the TOE authorizes the creation of new SCD/SVD pairs. The preceding SCD must be destroyed prior to the creation of new SCD/SVD pairs. The user of the electronic signature creation service of the TOE presents the data to be signed (DTBS) to the signatory, and prepares the DTBS representation that the signatory wishes to sign for performing the cryptographic signature function. The TOE returns a qualified electronic signature. 6&'69'0DQDJHPHQWLQWKH72(OLIHF\FOH Figure 4  describes the TOE life cycle in its SSCD function. IC Development IC Development Development of card software IC Design and implementation of the OS and software IC Manufacture & Testing IC Encapsulation & Testing Card production finishing process and pre- personalization Loading of general application data Utilization of the card Generation & Destruction of SCD/SVD Signature Creation End of life Phase 3 Phase 1 Phase 2 Phase 4 Phase 5 Phase 6 SCD Loading Phase 7 : Life phase in the life cycle of PP9911  )LJXUH66&'OLIHF\FOH  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 20 / 83  7+(72((19,5210(17  'HVFULSWLRQRILWVHQYLURQPHQW  With regards to TOE, four types of environments are defined: − Development and manufacturing (phase 1 to 4); − Pre-personalization (phase 5) and personalization (phase 6) of the Morpho-Citiz 32 card; − User (phase 7) during which the TOE is operational; − End of life of the TOE (phase 7) during which the TOE is rendered non-operational.  72(ORJLFDOSKDVHV During its manufacture and operation, the TOE goes through several phases of logical life. These phases are classed according to a controlled logical sequence. The passage of a phase to the subsequent phase shall be carried out under the control of the TOE.   "!$# %'&(  )*,+-.$.$-. /0 & 12%3# -546%7-7 46%7-7 89!$.: &( ;82!'&<6:#< & =;> ?:@ -A Test - 3 - User Initialisation 4 and 5 Pre-personalizer (administrator) User Personalization 6 Personalizer (administrator) User End user 7 Domain Authority and Issuer (administrator) User End of life 7 Issuer (administrator) 7DEOH/RJLFDOSKDVHVRIWKHIAS-eGOV application The configuration of the TOE environment is determined by the configuration of the integrated circuit (test or user of the integrated circuit), and by the life cycle of the TOE environment (pre-personalization, personalization, end user, end of life) provided by the embedded software. Once the configuration is determined, the TOE may not return to a preceding configuration. The different stages are specified in Table 1, and only the authorized administrator may implement the passage of a phase to the following phase. For the IAS-eGOV application, the passage from the "Non-Active” state to the "Active" state is performed subsequent to the initialisation and personalization of the Morpho-Citiz 32. card. The initialisation and personalization operations are performed under the control of the pre-personalizer and of the personalizer who act on the TOE as administrator via the IPA application commands. In the user phase, the user may use the IAS-eGOV application. services. During the end of life phase, the TOE is invalidated, meaning that all commands are rejected. Regardless of the life phase, the life phase change is irreversible.  86(56$1'52/(6 TOE users are the entities, personal or material, having an interaction with the TOE via its external interfaces. The table below presents the different TOE users and specifies the roles that are associated with them.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 21 / 83  *HQHULF8VHUV    ,QVHUWHU : User who intervenes in the insertion phase and ensures TOE administration. He especially provides an insertion number and a serial number. (Phase 4 and 5) 3HUVRQDOL]HU : User who intervenes in the personalizing phase and ensures TOE administration. He invalidates his own access to administration services at the end of the personalization phase by deactivation of the manufacturing key. (Phase 6) ,VVXHU : User who intervenes in the user phase. He may create/delete domains for an application. He also creates and updates secrets for the domains and the applications he accesses. He may also deactivate/activate an application. (Phase 7) 'RPDLQ$XWKRULWLHV : User who manages one or several domains. He may create/delete domains for a father domain. He also creates updates secrets for the domains he accesses. he may also deactivate/activate a domain if this latter is not an application. (Phase 7) %HDUHU : The Morpho-Citiz 32 card bearer that benefits from IAS-eGOV application. services. (Phase 7)  3URWHFWHGHOHFWURQLFVLJQDWXUH8VHUV In order to ensure compliance with protection profiles >5±66&'7@ and >5±66&'7@, the following users are defined for the secure electronic signature services:  686(5 : TOE end user that may be identified as S.Admin or S.Signatory (Phase 7) 6$GPLQ : User that is in charge of initializing the TOE, its personalization or other TOE administrative functions. (Phase 7) 66LJQDWRU\ : User that keeps the TOE and uses it on his own behalf or for that of a physical or legal person that they represent. (Phase 7) Threatening agent defined for the protected electronic signature services:  62))&$5' : Attacker. Human or process acting on its own behalf and located outside of the TOE. The S.OFFCARD attacker’s primary goal is to access sensitive application information. The attacker has a KLJKSRWHQWLDODWWDFNOHYHODQGNQRZVQRVHFUHW.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 22 / 83  7+(72(6(&85,7<(19,5210(17  7+(3523(57<72%(3527(&7(' The list of property to be protected by the TOE is comprised of a group of functions and data that may be grouped as follows: − The protective functions of the IAS-eGOV application; − User data; − TSF data; To which we may add the embedded software including the specification documents, source code and associated design documents.  )XQFWLRQVRIWKH,$6H*29DSSOLFDWLRQ The functions are supported by the executable code stored in ROM memory.  .$-3'&(  = B$!:C'&( :7 FCT.1 External asymmetrical authentification FCT.2 External asymmetrical authentification FCT.3 External symmetrical authentification FCT.4 Internal symmetrical authentification FCT.5 Mutual symmetrical authentification FCT.6 Data Encryption/decryption FCT.7 Mutual asymmetrical authentification FCT.8 Seal calculator, on external data FCT.9 Creation of an electronic signature FCT.10 Generation of bi-key authentification FCT.11 Generation of bi-key signature (SCD/SVD) FCT.12 Addition of a cryptographic key FCT.13 Establishment of a session key FCT.14 Asymmetrical secret decryption FCT.15 Activation of a cryptographic key FCT.16 Unlocking of a cryptographic key FCT.17 Activation of a bearer code FCT.18 Unlocking of the bearer code FCT.19 Verification of the bearer code FCT.20 Updating of bearer code FCT.21 Creation of files or directories FCT.22 Deletion of file/directory FCT.23 Writing/reading in a file or a TLV object with controlled access 7DEOH/LVWRIVHQVLWLYHIXQFWLRQV  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 23 / 83  8VHUGDWD The data used is information stored within the TOE. The users may intervene on this data within the framework of the security policy (TSP). However, the TSF gives no particular meaning to this data for which the audit trail is either protected or protected with read/write access restricted to an authorized user. They are displayed in the following table:  .$-3'&(  = D%& % 4"# & -CE&(  D.USE.1 Freely accessible read-only data, write protected Audit trail protection writing restricted to the authorized user D.USE.2 Read & write protected data Audit trail protection and reading restricted to the authorized user D.USE.3 Electronic signature data Audit trail protection 7DEOH8VHU´VHQVLWLYHGDWDOLVW  76)GDWD TSF data is information used by the TSF for creating the security policy (TSP). TSF data may be modified by TSP-authorized users. This data must feature either audit trail protection or both audit trail protection and a confidentiality element signalling. It is displayed in the following table:  .$-3'&(  = D%& % 4"#& -C'& " D.TSF.1 TDES keys for decryption of secrets and encryption/decryption of external data Audit trail and confidentiality D.TSF.2 Private RSA Keys and DH parameters for internal and external asymmetrical authentifications Audit trail and confidentiality D.TSF.3 Private RSA Keys for decryption of secrets Audit trail and confidentiality D.TSF.4 Certificates and associated public keys Audit trail and confidentiality D.TSF.5 TDES session keys used for confidentiality (KENC) and Audit trail (KMAC) in SM sessions Audit trail and confidentiality D.TSF.6 TDES Audit trail keys for data exportation and importation Audit trail and confidentiality D.TSF.7 Confidential bearer codes (PIN reference) Audit trail and confidentiality D.TSF.8 Deblocking codes for reference PIN codes (PUK code) Audit trail and confidentiality D.TSF.9 TOE security attributes Audit trail and confidentiality 7DEOH76)VHQVLWLYHGDWDOLVW  3URWHFWHGHOHFWURQLFVLJQDWXUH'HILQLWLRQRI66&'SURSHUW\ TOE property for secure electronic signature services are those defined in protection profiles >5 ± 66&' 7@ and >5±66&'7@, i.e.:  6&' : Private key used for performing an electronic signature operation (SCD confidentiality shall be preserved). 69' : Public key linked to the SCDs and used for performing electronic signature verification (SVD integrity during exportation shall be preserved). '7%6 F  : Collective data or their representation to be signed (its audit trail must be preserved). 9$' : PIN Code entered by the bearer for performing a signature operation (VAD confidentiality and authenticity as required by the authentification method are necessary) 5$' : Reference PIN code used for identifying and authentifying the bearer (RAD audit trail and confidentiality must be preserved) 66& : Secure signature creation function of the Morpho-Citiz 32 card using the SCD: (the quality of the function must be preserved in such a way as to allow it to participate in the electronic signatures validity). 6,* : Electronic signature: non-falsification electronic signatures must be preserved. 2 As well as the DTBS representation.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 24 / 83  $668037,216 Table 5 presents the assumptions under consideration for the present TOE and their correspondence with protection profiles >5±@, >5±66&'7@ and >5±66&'7@ as well as the target >5±&/67@. G:H)5877:!*JI'&( 7 4045KK$LL 445//0MDN& =3I-O 404 & =$I-P /0/0MD /0G5M# =3I&,Q3 +3# %3# = A.CGA A.CGA A.CGA A.SCA A.SCA A.SCA A.SCD_Generate A.SCD_Generate A.DEV_ORG A.DEV_ORG A.DLV_PROTECT A.DLV_PROTECT A.Process-Card A.DLV_AUDIT A.DLV_AUDIT A.Process-Card A.DLV_RESP A.DLV_RESP A.Process-Card A.USE_TEST A.USE_TEST A.USE_PROD A.USE_PROD A.Process-Card A.USE_DIAG A.USE_DIAG A.Plat-Appl A.Plat-Appl A.Resp-Appl A.Resp-Appl 7DEOH6733&RUUHVSRQGHQFHV±DVVXPSWLRQVIRUWKH72(  $VVXPSWLRQVGHILQHGLQ>5±&/67@ $3ODW$SSO 8WLOL]DWLRQRIWKHPDWHULDOSODWIRUP The smart card embedded software is designed such that the requirements stemming from the following documents are fulfilled: (i) the smart card integrated circuit guides (reference to the AGD Common Criteria insurance class) such as the material "data sheet,” and the material application notes, and (ii) the conclusions of the assessment reports of the smart card integrated circuit pertaining to the smart card embedded software. It must be emphasized that the smart card embedded software special requirements are often vague prior to consideration being given to a specific attack scenario during the smart card integrated circuit vulnerability analysis (AVA_VLA). Consequently, such results derived from the smart card integrated circuit assessment (such as those contained in the Technical Evaluation Report (TER) must be provided to smart card embedded software developers in an appropriate and authorized form and taken into consideration during software assessment. This also holds true for the additional tests required for combining the material and software. The smart card integrated circuit assessment must be completed prior to commencing assessment of the smart card embedded software. The assessment of the smart card portion of the TOE may be conducted prior to and independently of the assessment of the smart card embedded software. $UHVS$SSO 8VHUGDWDSURFHVVLQJ All user data is kept by the smart card embedded software. Consequently, it shall be presumed that the user sensitive data, especially the cryptographic keys, are processed by the embedded software in the smart card as defined for the specific application context. Details must be specified within the application context.  $VVXPSWLRQVGHILQHGLQ>5±@  $VVXPSWLRQVLQSKDVH  $'(9B25* Procedures that handle technical, physical, and organizational measures related to personnel with regards to confidentiality and the audit trail of the smart card embedded software (ex.: source code and all associated documents) and designer proprietary microcircuit information (tools, software, documentation…) must exist and be applied during software development.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 25 / 83  'HOLYHU\SURFHVVDVVXPSWLRQV SKDVHVWR  Procedures must guarantee the control of the delivery process and storage of the target of evaluation as well as compliance with these objectives as described in the following assumptions:  $'/9B3527(&7 Upon delivery and storage, procedures must ensure material protection of the TOE as well as protection of information relative to the TOE. $'/9B$8',7 Procedures must ensure that corrective action is executed in case of dysfunction of the delivery and storage process. $'/9B5(63 Procedures must ensure that the people handling the delivery procedure are qualified to do so.  $VVXPSWLRQVLQSKDVHVWR  $86(B7(67 It is presumed that the appropriate functionality tests of the target of evaluation are implemented in phases 4, 5 and 6. $86(B352' It is presumed that security procedures are implemented during all manufacture and test operations in phases 4, 5 and 6 in order to preserve the confidentiality and the audit trail of the target of evaluation and of its manufacture and test data (in order to avoid any possibility of copying, modification, retention, theft or unauthorized use).  $VVXPSWLRQVLQSKDVH  $86(B',$* It is presumed that secure communication protocol and secure procedure are used between the smart card and the terminal.  $VVXPSWLRQVGHILQHGLQ>5±66&'7@DQG>5±66&'7@ Protection profile hypothesis >5±66&'7@ $6&'B*HQHUDWH 5HOLDEOHJHQHUDWLRQRI6&'69' If a party other than the signatory generates the SCD/SVD pair for a signatory, then: (a) this party shall use a SSCD for SCD/SVD generation; (b) the confidentiality of the SCD shall be preserved until the SCD falls under the signatory’s exclusive control; (c) the SCD shall not be used for signature creation until the SCD falls under the signatory’s exclusive control; (d) SCD/SVD generation shall be exclusively called upon by authorized users; (e) the Type 1 SSCD shall assure the authenticity of the SVD that he created and exported. Assumptions common to protection profiles >5±66&'7@DQG>5±66&'7@: $&*$  $UHOLDEOHFHUWLILFDWLRQJHQHUDWLRQDSSOLFDWLRQ The CGA protects the authenticity of the signatory’s name and the SVD in the qualified certificate by a CSP advanced signature. $6&$  $UHOLDEOHVLJQDWXUHFUHDWLRQDSSOLFDWLRQ  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 26 / 83 The signatory shall only use a reliable SCA. The SCA generates and sends the DTBS representation data that the signatory wishes to sign in an appropriate form for signature by the TOE.  7+5($76 Table 6 presents the threats considered in the present TOE and their correspondence with protection profiles >5±@, >5±66&'7@ and >5±66&'7@ as well as the target >5±&/67@. G"63# -%& 7 :#:&(6- G:H) 445KK3LL 404 & =3I-O /0/0MD 445//0MDRP /0G5M# =3I'&,Q3 + T.Hack_Phys T.Hack_Phys T.Hack_Phys T.SCD_Divulg T.SCD_Divulg T.SCD_Divulg T.SCD_Derive T.SCD_Derive T.SCD_Derive T.Sig_Forgery T.Sig_Forgery T.Sig_Forgery T.Sig_Repud T.Sig_Repud T.Sig_Repud T.SVD_Forgery T.SVD_Forgery T.SVD_Forgery T.DTBS_Forgery T.DTBS_Forgery T.DTBS_Forgery T.SigF_Misuse T.SigF_Misuse T.SigF_Misuse T.CLON T.CLON T.Phys-Probing T.DIS_INFO T.DIS_INFO T.DIS_DEL T.DIS_DEL T.DIS_ES1 T.DIS_ES1 T.DIS_TEST_ES T.DIS_TEST_ES T.T_DEL T.T_DEL T.T_TOOLS T.T_TOOLS T.T_SAMPLE2 T.T_SAMPLE2 T.MOD_DEL T.MOD_DEL T.MOD T.MOD T.DIS_DEL1 T.DIS_DEL1 T.DIS_DEL2 T.DIS_DEL2 T.MOD_DEL1 T.MOD_DEL1 T.MOD_DEL2 T.MOD_DEL2 T.DIS_ES2 T.DIS_ES2 T.Leak-Inherent T.Phys-Probing T.Leak-Forced T.T_ES T.T_ES T.T_CMD T.T_CMD T.Abuse-Func T.MOD_LOAD T.MOD_LOAD T.Phys-Manipulation T.MOD_EXE T.MOD_EXE T.Phys-Manipulation T.MOD_SHARE T.MOD_SHARE T.Phys-Manipulation T.MOD_SOFT T.MOD_SOFT T.Phys-Manipulation T.Malfunction T.Malfunction T.RND T.RND 7DEOH6733&RUUHVSRQGHQFHV±WKUHDWVIRUWKH72(  7KUHDWVGHILQHGLQ>5±&/67@ 70DOIXQFWLRQ )DXOW\IXQFWLRQLQJGXHWRHQYLURQPHQWDOVWUHVV An attacker may cause faulty functioning of the TSF or of the smart card embedded software by applying an environmental stress for the purpose of deactivating or modifying the security characteristics or the functions of the TOE. This may be done by using the smart card outside of its normal operating conditions. In order to take advantage of this, an attacker needs information concerning the operational functioning. 751' 5DQGRPQXPEHUVGHILFLHQF\ An attacker may predict or obtain information concerning the random numbers generated by the TOE, for example, with the help of a lack of entropy of random numbers provided. An attacker may obtain information on the random numbers generated. This could cause a problem if they are used for generating cryptographic keys, for example. Here, the attacker is presumed to take advantage of the statistical properties of random numbers generated by the TOE without specific knowledge concerning the TOE generator. Dysfunction or premature ageing are also  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 27 / 83 considered as capable of facilitating acquisition of information regarding random data. Both the PHILIPS component random numbers generator and that of the cryptographic library are considered here.  7KUHDWVGHILQHGLQ>5±@ Threats are classified as: − threats against which specific protection must be integrated into the target of evaluation (class I); − threats against which specific protection must be integrated into the environment (class II).  3DUWLDORUWRWDOFORQLQJRIWKHXQDXWKRUL]HG72(  7&/21 The functional cloning of the target of evaluation (total or partial) appears to apply to all phases of the life cycle of the target of evaluation, from phase 1 to phase 7, but only phases 1 and 4 to 7 are discussed here, insofar as the functional cloning of phases 2 and 3 is found solely in the field of application of the protection profile of the smart card microcircuits. Generally, this threat is derived from specific threats combining unauthorized disclosure, modification or theft of property in different phases.  7KUHDWVLQSKDVH During phase 1, three types of threats must be considered: a) : Threats on the smart card embedded software and its development environment, such as the unauthorized disclosure, modification or theft of the smart card embedded software and/or initialisation data in phase 1. b) : Threats on the property transmitted by the microcircuit designer to the smart card software developers during the smart card embedded software development phase. c) : Threats on the smart card embedded software and on the initialisation data transmitted during the delivery process by the smart card software developers to the microcircuit designer. 8QDXWKRUL]HGSURSHUW\GLVFORVXUH This type of threat covers the unauthorized disclosure of property by attackers who may have various technical skills, resources and motivations. Such attackers must also possess technical knowledge of the product.  7',6B,1)2 W\SHE  Unauthorized property disclosure provided by the microcircuit designer to smart card embedded software developers, such as disclosure of sensitive information regarding the microcircuit specification, the conception and technology, the software and tools, as the case arises. 7',6B'(/ W\SHF  Unauthorized disclosure of the smart card embedded software and of any supplementary application data, (such as the microcircuits initialisation requirements) during the delivery phase to the microcircuit designer. 7',6B(6 W\SHD  Unauthorized disclosure of the embedded software (technical or detailed specifications, implementation code) and/or application data (e.g., secret codes, control parameters of the protection system, specifications and implementation of security mechanisms). 7',6B7(67B(6 W\SHDDQGF  Unauthorized disclosure of smart card embedded software test programmes or any other related information. 7KHIWRUXQDXWKRUL]HGXWLOL]DWLRQRISURSHUW\  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 28 / 83 Potential attackers may have access to the target of evaluation and perform operations without being authorized. For example, such an attacker may personalize, modify or influence the product in such a way as to access the smart card application system.  77B'(/ W\SHF  Theft of the smart card embedded software and of any supplementary application data (e.g., the pre- personalization requirements) during the delivery phase to the microcircuit designer.  77B722/6 W\SHDDQGE  Theft or unauthorized use of smart card embedded software development tools (e.g., PC, development software, databases) 77B6$03/( W\SHD  Theft or unauthorized use of target of evaluation samples (e.g., microcircuit unsoldered with embedded software). 8QDXWKRUL]HGPRGLILFDWLRQRISURSHUW\ The target of evaluation may be subject to different types of logical or physical attacks that may diminish security. Because of the designated usage for the target of evaluation (its environment may be hostile), the security of the target of evaluation may be circumvented or compromised, thus reducing the security mechanisms of the target of evaluation and deactivating their capacity for managing the security of the target of evaluation. This type of threat includes employing hostile Trojan horses.  702'B'(/ W\SHF  Unauthorized smart card embedded software modification and of any supplementary applicative data (e.g., microcircuit initialisation requirements) during the delivery phase to the microcircuit designer. 702' W\SHD  Unauthorized modification of the embedded software and/or applicative data or any information related thereto (technical specifications).  7KUHDWVRQGHOLYHULHVIRUSKDVHDQGSKDVHVWR Threats on the data transmitted during the delivery process from the smart card developers to the microcircuit housing manufacturer, to the finishing process manufacturer or to the personalizer. These threats are described below:  7',6B'(/ Unauthorized disclosure of applicative data during delivery to the microcircuit housing manufacturer to the manufacturer of the finishing process or to the personalizer. 7',6B'(/ Unauthorized disclosure of applicative data delivered to the microcircuit housing manufacturer, to the manufacturer of the finishing process or to the personalizer. 702'B'(/ Unauthorized modification of applicative data during delivery to the microcircuit housing manufacturer, to the manufacturer of the finishing process or to the personalizer. 702'B'(/ Unauthorized modification of applicative data delivered to the microcircuit housing manufacturer, to the manufacturer of the finishing process or to the personalizer.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 29 / 83  7KUHDWVLQSKDVHVWR The threats considered during these phases may be grouped into three types: − Unauthorized disclosure of property; − Unauthorized theft or use of property; − Unauthorized property modification. 8QDXWKRUL]HGSURSHUW\GLVFORVXUH This type of threat covers the unauthorized disclosure of property by attackers that may have various technical skills, resources and motivations. Such attackers may also have technical knowledge of the product.  7',6B(6 Unauthorized disclosure of the embedded software and applicative data (such as data protection systems, memory compartmentalization, programmes and cryptography keys). 7KHIWRUXQDXWKRUL]HGXVHSURSHUW\ Potential attackers may have access to the target of evaluation and perform operations without being authorized. For example, these attackers may personalize the product in an unauthorized manner or attempt a fraudulent access to the smart card system.  77B(6 Theft or unauthorized use of the target of evaluation (e.g., microcircuit unsoldered with embedded software).  77B&0' Unauthorized use of instructions, commands or command sequences sent to the target of evaluation. 8QDXWKRUL]HGPRGLILFDWLRQRISURSHUW\ The target of evaluation may be subject to different types of logical or physical attacks liable to diminish security. Because of the designated usage for the target of evaluation (its environment may be hostile), the target of evaluation security elements may be circumvented or compromised, thus reducing the target of evaluation security mechanisms and deactivating their capacity for managing the security of the target of evaluation. This type of threat includes employing hostile Trojan horses, back doors, virus downloading or unauthorized programmes.  702'B/2$' Unauthorized loading of programmes.  702'B(;( Unauthorized execution of programmes. 702'B6+$5( Unauthorized modification of the behaviour of the programme through interaction with different programmes. 702'B62)7 Unauthorized modification of the smart card embedded software and applicative data.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 30 / 83  &ODVVLILFDWLRQGHVWKUHDWV Table 7 below indicates the relations between the life cycle phases of the smart card, the threats and the types of threats: G"63# -%& 7 406%7-5L 406%7-S 46%7-;T 46%7-U 406%7- V T.CLON Class II Class I Class I Class I Class I T.DIS_INFO Class II T.DIS_DEL Class II T.DIS_DEL1 Class II T.DIS_DEL2 Class II Class II Class II T.DIS_ES1 Class II T.DIS_TEST_ES Class II T.DIS_ES2 Class I Class I Class I Class I T.T_DEL Class II T.T_TOOLS Class II T.T_SAMPLE2 Class II T.T_ES Class I Class I Class I Class I T.T_CMD Class I Class I Class I Class I T.MOD_DEL Class II T.MOD_DEL1 Class II T. MOD_DEL2 Class II Class II Class II T.MOD Class II T.MOD_SOFT Class I Class I Class I Class I T.MOD_LOAD Class I Class I Class I Class I T.MOD_EXE Class I Class I Class I Class I T.MOD_SHARE Class I Class I Class I Class I T.Malfunction Class I Class I T.RND Class I Class I 7DEOH7KUHDW&ODVVLILFDWLRQ Class I : Threats triggering protections implemented by the TOE. Class II : Threats triggering protections implemented by the TOE environment.  7KUHDWVGHILQHGLQ>5±66&'7@DQG>5±66&'7@ The following threats are those defined in protection profiles >5 ± 66&' 7@ and >5 ± 66&' 7@. The threatening agent is a human or a process acting on its own behalf and located outside of the TOE. The primary goal of the attacker is to access sensitive information linked to secure electronic signature services. The attacker has a high attack potential and knows no secret. 7+DFNB3K\V  3K\VLFDODWWDFNVE\WKH72(LQWHUIDFHV An attacker interacts with the TOE interfaces for exploiting vulnerabilities, which resultingly compromises security arbitrarily. This threat concerns all property. 76&'B'LYXOJ  6WRUDJHFRS\LQJDQGFLUFXODWLRQRIVLJQDWXUHFUHDWLRQGDWD An attacker may store or copy the SCD outside of the TOE. An attacker may distribute the SCD during their generation, storage and utilization for signature creation in the TOE. 76&'B'HULYH  )LQGWKHVLJQDWXUHFUHDWLRQGDWD An attacker finds the SCD in known public data, such as the SVD corresponding to the SCDs or the signatures created by SCDs or other data transmitted outside of the TOE which pose a threat to SCD confidentiality. 76LJB)RUJHU\  (OHFWURQLFVLJQDWXUHIRUJHU\ An attacker forges the signed data object and perhaps also his electronic signature created by the TOE and the violation of the audit trail of the object of the signed data is not detectable by the signatory or by third parties. The TOE-generated signature is subject to deliberate attacks by experts with a high attack potential with the help of advanced knowledge with regards to security principles and concepts employed by the TOE.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 31 / 83 76LJB5HSXG  6LJQDWXUHUHQXQFLDWLRQ Should an attacker successfully threaten a property, the non-renunciation of the electronic signature is then compromised. The signatory is thus able to deny having signed data by using SCDs in the TOE under his control even if the signature is successfully verified relative to the SVDs contained in his unrevoked certificate. 769'B)RUJHU\  )RUJHU\RIVLJQDWXUHYHULILFDWLRQGDWD An attacker forges the SVD presented by the TOE to the CGA, resulting in a loss of SVD integrity in the signatory’s certificate. 7'7%6B)RUJHU\  )RUJHU\RIWKH'7%6UHSUHVHQWDWLRQ An attacker modifies the representation of the DTBS sent by the SCA. The representation of the DTBS thus used by the TOE for signature does not correspond to the DTBS that the signatory intends to sign. 76LJ)B0LVXVH  3RRUXVHRIWKH72(VLJQDWXUHFUHDWLRQIXQFWLRQ An attacker poorly uses the TOE signature creation function for creating an SDO for data that the signatory has decided not to sign. The TOE is subject to deliberate attacks by experts with a high attack potential with the help of advanced knowledge with regards to security principles and concepts employed by the TOE.  25*$1,=$7,21$/6(&85,7<32/,&,(6 Table 8 presents the organizational security policies considered for the present TOE and their correspondence with protection profiles >5±@, >5±66&'7@ and >5±66&'7@ as well as the target >5±&/67@. G:H)R4@  C -7 4045KK$LL 44 & =3I-O//0MD 404 & =$I-P /0/0MD /G,M# =3I& J@  +3# %$# =;W P.Add-Components P.Add-Components P.Add-Func P.Add-Func P.CSP_Qcert P.CSP_Qcert P.CSP_Qcert P.Qsign P.Qsign P.Qsign P.Sigy_SSCD P.Sigy_SSCD P.Sigy_SSCD 7DEOH6733&RUUHVSRQGHQFH±RUJDQL]DWLRQDOVHFXULW\SROLFLHVIRUWKH72(  3ROLFLHVGHILQHGLQ>5±&/67@ 3$GG&RPSRQHQWV $GGLWLRQRIVSHFLILFVHFXULW\FRPSRQHQWV The integrated circuit part in the smart card of the TOE provides the following additional security functionalities to the smart card embedded software: - TDES Encryption and decryption - Zone-based access control memory - Access control to Special Functions Registers - Separation memory for different parts of the software The cryptographic library part of the TOE uses the Triple DES processor of the material for providing DES security functions, as listed below in P.Add-Func. The cryptographic library does not use the zone-based access control memory or the access control to Special Functions Registers. These characteristics are for the smart card embedded software, which includes the cryptographic library. 3$GG)XQF $GGLWLRQRIVSHFLILFVHFXULW\IXQFWLRQDOLWLHV  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 32 / 83 The cryptographic library part of the TOE shall provide the following additional security functionalities to the smart card embedded software: - TDES Encryption and decryption - RSA RSA-CRT Algorithms - RSA key generation - SHA-1Hash Algorithm - RNG access (implementation of RNG software and tests for RNG material) - Secure copying routine. Moreover, the TOE shall provide: - protection of residual information; and - resistance against attacks by covert channels as described in Table 9: Resistance of cryptographic algorithms . The qualities of the cryptographic algorithms according to their resistance to attacks by covert channels are summarized in the following table: 89@ 3:#< &6$* ?-7: 7& %3C- %$%$ 7&%& & %C$XY7Z DES and DES3 Timing SPA DPA DFA RSA-CRT algorithm 1 Timing SPA DPA DFA RSA-CRT algorithm 2 Timing SPA DPA n.a. RSA Timing SPA DPA n.a. RSA key generation Timing SPA n.a. n.a. SHA-1 Timing* SPA* n.a. n.a. 7DEOH5HVLVWDQFHRIFU\SWRJUDSKLFDOJRULWKPV * The resistance is only guaranteed if the TOE functions according to certain pre-requisites. The abbreviation n.a. means that the TOE does not provide countermeasures. This does not necessarily mean that the algorithm is not secure, but rather that at the time of drafting of this security target, no undesirable attack was known.  3ROLFLHVGHILQHGLQ>5±66&'7@ DQG >5±66&'7@ The organizational security policies of the TOE defined in protection profiles >5±66&'7@ and >5±66&' 7@ are applicable when the TOE is used within the framework of a qualified electronic signature creation service. Otherwise, they are not applicable. 3&63B4FHUW  4XDOLILHG&HUWLILFDWH The CSP uses a trustworthy CGA for generating the SVD qualified certificate generated by the SSCD. The qualified certificates contain at least the elements defined in Annexe I of the Directive, i.e., among other things, the signatory’s name and the SVD corresponding to the SCDs implemented in the TOE under the signatory’s exclusive control. The CSP guarantees that the utilization of the TOE for signature is proven by the certificate or other publicly available information. 34VLJQ  4XDOLILHGHOHFWURQLFVLJQDWXUHV The signatory uses a signature creation system for signing the data with the help of qualified electronic signatures. The DTBS are presented to the signatory by the SCA. The qualified electronic signature is based on a qualified certificate (in compliance with Annexe 1 of the Directive) and is created by an SSCD. 36LJ\B66&'  72(DVDVHFXUHVLJQDWXUHFUHDWLRQGHYLFH The TOE implements the SCD used for signature creation under the sole control of the signatory. In practise, the SCDs used for generating the signature may only appear once.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 33 / 83  6(&85,7<2%-(&7,9(6 This section identifies and defines the TOE Security Objectives and the TOE environment Security Objectives. The Security Objectives reflect the stated intention and counter the threats identified while complying with the identified organizational security policies and assumptions. The TOE Security Objectives and the TOE environment Security Objectives are those defined in protection profile >5±@, >5±66&'7@ and >5±66&'7@ as well as the target >5±&/67@.  72(6(&85,7<2%-(&7,9(6 Table 10 presents the Security Objectives established for the present TOE and their correspondence with protection profiles >5±@, >5±66&'7@ and >5±66&'7@ as well as with the target >5±&/67@. G:H2)J/-C!3#( & =;H+\[ -C& ]-7 4045KK$LL 404 & =3I- O//^MD 44 & =3I-P//0MD /0G5M# =$I&,@  +$# %$# = W OT.EMSEC_Design OT.EMSEC_Design OT.EMSEC_Design OT.Lifecycle_Security OT.Lifecycle_Security OT.Lifecycle_Security OT.SCD_Secrecy OT.SCD_Secrecy OT.SCD_Secrecy OT.SCD_SVD_Corresp OT.SCD_SVD_Corresp OT.SCD_SVD_Corresp OT.SVD_Auth_TOE OT.SVD_Auth_TOE OT.SVD_Auth_TOE OT.Tamper_ID OT.Tamper_ID OT.Tamper_ID OT.Tamper_Resistance OT.Tamper_Resistance OT.Tamper_Resistance OT.SCD_Transfer OT.SCD_Transfer OT.Init OT.Init OT.SCD_Unique OT.SCD_Unique OT.DTBS_Integrity_TOE OT.DTBS_Integrity_TOE OT.DTBS_Integrity_TOE OT.Sigy_SigF OT.Sigy_SigF OT.Sigy_SigF OT.Sig_Secure OT.Sig_Secure OT.Sig_Secure O.TAMPER_ES O.TAMPER_ES O.Leak-Inherent O.Phys-Probing O.Phys-Manipulation O.Leak-Forced O.Abuse-Func O.CLON O.CLON O.OPERATE O.OPERATE O.Malfunction O.Leak-Forced O.Abuse-Func O.SFR_ACCESS O.DIS_MECHANISM2 O.DIS_MECHANISM2 O.Leak-Inherent O.Phys-Probing O.Leak-Forced O.DIS_MEMORY O.DIS_MEMORY O.Leak-Inherent O.Phys-Probing O.Leak-Forced O.MEM_ACCESS O.SFR_ACCESS O.MOD_MEMORY O.MOD_MEMORY O.Phys-Manipulation O.MEM_ACCESS O.SFR_ACCESS O.RND O.RND O.HW_DES3 O.HW_DES3 O.DES3 O.DES3 O.RSA O.RSA O.RSA_KEYGEN O.RSA_KeyGen O.SHA-1 O.SHA-1 O.REUSE O.REUSE  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 34 / 83 O.COPY O.COPY 7DEOH6733&RUUHVSRQGHQFH±72(6HFXULW\2EMHFWLYHV  6HFXULW\2EMHFWLYHVGHILQHGLQ>5±&/67@ 251' 5DQGRPQXPEHUV The TOE shall ensure the cryptographic quality of random number generation. For example, random numbers must not be predictable and must have sufficient entropy. The TOE shall ensure that no information concerning random numbers produced becomes available for an attacker since they can be used, for example, for generating cryptographic keys. Both the PHILIPS component random number generator and that of the cryptographic library are considered here. 2+:B'(6 7'(6PDWHULDOIXQFWLRQDOLW\ The TOE shall provide the cryptographic functionality material for calculating a triple DES (TDES) encryption and decryption on the smart card embedded software. The component directly supports TDES calculation using up to three different keys. Note: The TOE shall ensure user data confidentiality (especially that of cryptographic keys) during a cryptographic operation. 2'(6 The TOE features the encryption and decryption functionality for the triple DES algorithm that resists the attacks described in Table 9: Resistance of cryptographic algorithms . It uses the DES material resource defined in objective O.HW_DES3 defined hereabove in this target. 256$ The TOE features the public keys processing functionality using the RSA and RSA-CRT algorithms, resistant against the attacks described in Table 9: Resistance of cryptographic algorithms . 256$B.H\*HQ The TOE features the functionality for generating pairs of RSA and RSA-CRT keys, resistant to the attacks described in Table 9: Resistance of cryptographic algorithms . 26+$ The TOE features the functionality of providing hashing means using the SHA-1 algorithm, resistant to the attacks described in Table 9: Resistance of cryptographic algorithms . 2&23< The TOE features the memory content copy functionality using a routine that implements countermeasures towards attacks by covert channels. 25(86( The TOE features measures for ensuring that the memory resources used by the TOE cannot be disclosed between consecutive users of the same resource memory.  6HFXULW\2EMHFWLYHVGHILQHGLQ>5±@ The TOE shall employ the most advanced technologies in order to ensure the following IT Security Objectives. In order to do so, when physical microcircuit security functionalities are used, their specifications must be respected. When the physical microcircuit security functionalities are not used, the Security Objectives must be reached through other means. 27$03(5B(6  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 35 / 83 The target of evaluation must hinder attacks on its critical security elements. Security mechanisms must especially hinder the unauthorized modification of functional parameters, security attributes and secret codes such as the life cycle sequence markers and the cryptography keys. The embedded software must be designed such that the interpretation of electrical signals emitted from material parts of the target of evaluation are avoided. 2&/21 The target of evaluation functionality must be protected from cloning. 223(5$7( The target of evaluation shall ensure continuity of the correct functioning of the security functions. 2',6B0(&+$1,60 The target of evaluation shall ensure that the embedded software security mechanisms are protected against unauthorized disclosure. 2',6B0(025< The target of evaluation shall ensure that the sensitive information stored in memory is protected against the unauthorized disclosure. 202'B0(025< The target of evaluation shall ensure that the sensitive information stored in memory is protected against any corruption or unauthorized modification.  6HFXULW\2EMHFWLYHVGHILQHGLQ>5±66&'7@DQG>5±66&'7@ >5±66&'7@protection profile objective: 276&'B7UDQVIHU  3URWHFWHGWUDQVIHURI6&'EHWZHHQ66&'V The TOE shall ensure the confidentiality of SCD transferred between SSCDs. Protection profile objectives >5±66&'7@   27,QLW  6&'69'*HQHUDWLRQ The TOE provides security functions for guaranteeing that the generation of SCDs and SVDs is called for solely by authorized users. 276&'B8QLTXH  8QLTXHFKDUDFWHURIVLJQDWXUHFUHDWLRQGDWD The TOE shall ensure the cryptographic quality of the SCD/SVD pair for the qualified electronic signature. The SCD used for the generation of the signature can appear, in practise, only once and can not be reconstructed from SVDs. In this context, "in practise only once” means that the probability of an identical SCD is negligible. Protection profile objectives common to >5±66&'7@ and >5±66&'7@: 27(06(&B'HVLJQ  3URYLGHSK\VLFDOVHFXULW\IRUHPDQDWLRQV Design and build the TOE for being able to control the production of intelligible emanations within specified limits. 27/LIHF\FOHB6HFXULW\  /LIHF\FOHVHFXULW\ The TOE shall detect the defects during operational initialisation, personalization and utilization. The TOE shall provide safe destruction techniques for the SCD in the case of new generation. 276&'B6HFUHF\  &RQILGHQWLDOLW\RIVLJQDWXUHFUHDWLRQGDWD SCD confidentiality used for signature generation is sufficiently protected against high potential attacks. 276&'B69'B&RUUHVS  &RUUHVSRQGHQFHEHWZHHQWKH69'DQGWKH6&'  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 36 / 83 The TOE shall guarantee the correspondence between the SVD and the SCD. The TOE shall verify, on demand, the correspondence between the SCD stored in the TOE and the SVD if they were sent to the TOE. 2769'B$XWKB72(  7KH72(JXDUDQWHHVWKHDXWKHQWLFLW\GHV69' The TOE provides the means for allowing the CGA to verify the authenticity of the SVDs that were exported by this TOE. 277DPSHUB,'  ,QWUXVLRQGHWHFWLRQ The TOE provides system functions that detect physical intrusion of a system component and uses these functions for limiting the security breaches. 277DPSHUB5HVLVWDQFH  ,QWUXVLRQUHVLVWDQFH The TOE avoids or resists physical intrusion with specified "system” devices and components. 27'7%6B,QWHJULW\B72(  9HULILFDWLRQRIWKHLQWHJULW\RIWKH'7%6UHSUHVHQWDWLRQ The TOE shall verify that the DTBS representation received of the SCA has not been modified during transfer between the SCA and the TOE. The TOE itself shall ensure that the DTBS representation is not modified by the TOE either. It must be emphasized that that does not enter into conflict with the signature creation process where the DTBS themselves may be "hashed” by the TOE. 276LJ\B6LJ)  6LJQDWXUHJHQHUDWLRQIXQFWLRQVROHO\IRUWKHOHJLWLPDWHVLJQDWRU\ The TOE provides a signature generation function solely for the legitimate signatory and protects the SCD against utilization by someone else. The TOE shall resist high potential attacks. 276LJB6HFXUH  &U\SWRJUDSKLFHOHFWURQLFVLJQDWXUHSURWHFWLRQ With the help of robust encryption techniques, the TOE generates electronic signatures that can not be forged without knowing the SCD. The SCD can not be rebuilt with the help of electronic signatures. The electronic signatures must be able to resist these attacks even if they are performed with a high attack potential.  6(&85,7<2%-(&7,9(6)257+(72((19,5210(17 Table 11 presents the Security Objectives established for the environment of the present TOE and their correspondence with protection profiles >5 ± @, >5 ± 66&' 7@ and >5 ± 66&' 7@ as well as with target >5±&/67@. /-C$!$#< & =_H+\[ -C'& ]-7`:# &(6-G3H)J-$]: # * -$& 4045KK$LL 404 & =3I- O//^MD 445/"/^MDN& =$I-P /G,C$# =3I'& J@  +3# %3# =$W OE.SCD_SVD_Corresp OE.SCD_SVD_Corresp OE.SCD_Transfer OE.SCD_Transfer OE.SCD_Unique OE.SCD_Unique OE.CGA_Qcert OE.CGA_Qcert OE.CGA_Qcert OE.SVD_Auth_CGA OE.SVD_Auth_CGA OE.SVD_Auth_CGA OE.HI_VAD OE.HI_VAD OE.HI_VAD OE.SCA_Data_Intend OE.SCA_Data_Intend OE.SCA_Data_Intend O.DEV_TOOLS O.DEV_TOOLS OE.Process-TOE O.DEV_DIS_ES O.DEV_DIS_ES OE.Process-TOE O.SOFT_DLV O.SOFT_DLV OE.Process-TOE O.INIT_ACS O.INIT_ACS OE.Process-Card O.SAMPLE_ACS O.SAMPLE_ACS OE.Process-TOE OE.Process-Card O.DLV_PROTECT O.DLV_PROTECT OE.Process-TOE OE.Process-Card O.DLV_AUDIT O.DLV_AUDIT OE.Process-TOE O.DLV_RESP O.DLV_RESP O.DLV_DATA O.DLV_DATA OE.Process-Card O.FLAW O.FLAW O.TEST_OPERATE O.TEST_OPERATE OE.Process-Card O.USE_DIAG O.USE_DIAG OE.Plat-Appl OE.Plat-Appl  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 37 / 83 OE.Resp-Appl OE.Resp-Appl 7DEOH6733&RUUHVSRQGHQFH±6HFXULW\2EMHFWLYHVIRUWKH72(HQYLURQPHQW  2EMHFWLYHVIRUWKH72(HQYLURQPHQWGHILQHGLQ>5±&/67@  2(3ODW$SSO 8WLOL]DWLRQRIWKHPDWHULDOSODWIRUP In order to ensure that the TOE is used in a safe manner, the smart card embedded software must be designed such that the requirements of the following documents are satisfied: (i) the data sheet of the integrated circuit material of the smart card, (ii) the application notes of the smart card integrated circuit and (iii) the conclusions of the assessment reports of the integrated circuit of the smart card pertaining to the smart card embedded software. 2(5HVS$SSO 3URFHVVLQJXVHUGDWD The user sensitive data, especially the cryptographic keys, are processed by the smart card embedded software as required by the security needs of the specific context application.  6HFXULW\2EMHFWLYHVIRUWKH72(HQYLURQPHQWDVGHILQHGLQ>5±@  3KDVH2EMHFWLYHV  2'(9B722/6 The smart card embedded software must be designed in a safe manner, using solely software development tools (compiler assemblers, link editors, simulators…) and software-material (emulators) integration test tools ensuring programmes and data integrity. 2'(9B',6B(6 The embedded software developers shall use established procedures in order to control the storage and usage of classified development tools as well as the classified documentation in order to guarantee integrity and the confidentiality of the target of evaluation. It must be guaranteed that the tools are provided and accessible exclusively for the authorized personnel of each party. It must be guaranteed that the confidential information relatives to the property defined are provided to the authorized personnel of each party on the sole basis of the need to know them. 262)7B'/9 The smart card embedded software must be delivered by the smart card embedded software developers (Phase 1) to the microcircuit designer via a procedure of delivery and secure verification capable of ensuring software integrity and confidentiality as the need arises. 2,1,7B$&6 Initialisation data (physical, organizational, technical and personnel-related procedures) shall be accessible to authorized personnel only. 26$03/(B$&6 The samples used for performing tests must be accessible exclusively to authorized personnel.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 38 / 83  'HOLYHU\SURFHVVREMHFWLYHVIRUSKDVHVWR 2'/9B3527(&7 Procedures must ensure protection of material/information of the target of evaluation upon delivery. They shall include the following objectives: − Non-disclosure of security-related information; − Identification of elements to be delivered; − Respect of confidentiality rules (level of confidentiality, dispatch note, acknowledgement of receipt); − Physical protection against the external damage; − Secure storage and handling procedures, including refused assessment targets); − Traceability of assessment targets being delivered, including the following parameters: − details regarding the origin and shipping; − reception, acknowledgement of receipt; The equipment location and information. 2'/9B$8',7 The procedures must ensure that corrective action is taken in case of dysfunction in the delivery process (including, as the case may be, any non-compliance with confidentiality agreements) and highlight any non- respect of this process.  2'/9B5(63 The procedures must ensure that the personnel (of the shipping and receiving department, the carrier,) who intervene during the delivery procedure have the skill, the training and the knowledge required for fulfilling the requirements of this procedure and are capable of acting in perfect correspondence with the expectations cited hereabove.  'HOLYHU\SURFHVVREMHFWLYHVIRUSKDVHVWRDQG 2'/9B'$7$ The "applicative” data must be delivered by the embedded software developers (phase 1) either to the microcircuit housing manufacturer, to the process definition manufacturer or to the personalizer via a delivery and secure verification procedure capable of ensuring the audit trail and the confidentiality of the applicative data. 2)/$: The target of evaluation shall contain no flaws in design, implementation or functioning.  2EMHFWLYHVIRUSKDVHVWR 27(67B23(5$7( Appropriate functionality tests for the target of evaluation must be implemented in phases 4 to 6. During all manufacturing and test operations, security procedures must be implemented in phases 4, 5 and 6 in order to ensure the confidentiality and audit trail of the target of evaluation and its manufacturing and test data.  3KDVHREMHFWLYHV 286(B',$* Secure communications protocols and procedures must be used between the smart card and the terminal.  6HFXULW\2EMHFWLYHVIRUWKH,7HQYLURQPHQWRIWKH72( These objectives are defined in protection profiles >5±66&'7@ and >5±66&'7@. Security Objectives for the IT environment of the TOE in >5±66&'7@: 2(6&'B69'B&RUUHVS  &RUUHVSRQGHQFHEHWZHHQ69'DQG6&' Le SSCD Type 1 shall ensure the correspondence between the SVD and the SCD. The Type 1 SSCD shall verify the correspondence between the SCD sent to the TOE and the SVD sent to the CGA or to the TOE.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 39 / 83 2(6&'B7UDQVIHU  6HFXUH6&'WUDQVIHUEHWZHHQ66&' The Type 1 SSCD shall ensure the confidentiality of the SCD transferred to the TOE. The Type 1 SSCD shall provide against the exportation of an SCD that has already been used for signature generation by a type 2 SSCD. The SCD shall be destroyed in the Type 1 SSCD every time it is exported into the TOE. 2(6&'B8QLTXH  6LJQDWXUHFUHDWLRQGDWDXQLFLW\ The Type 1 SSCD shall ensure the cryptographic quality of the SCD/SVD pair for the qualified electronic signature. The SCD used for signature generation cannot in practise appear only once and it cannot be reconstructed from SVDs. In this context, " in practise appear only once” means that the probability of an identical SCD is a negligible quantity. Security Objectives for the IT environment of the TOE common to >5±66&'7@ and >5±66&'7@: 2(&*$B4FHUW  *HQHUDWLRQRITXDOLILHGFHUWLILFDWHV The CGA generates qualified certificates that include among other things: (a) the name of the signatory auditing the TOE; (b) the SVD corresponding with the SCD implemented in the TOE under the sole control of the signatory; (c) the advanced CSP signature. 2(69'B$XWKB&*$  7KH&*$YHULILHVWKH69'DXWKHQWLFLW\ The CGA verifies that the SSCD is the issuer of the SVD received and that the audit trail of the SVD received is intact. The CGA verifies the correspondence between the SCD in SSCD of the signatory and the SVD du qualified certificate. 2(+,B9$'  9$'3URWHFWLRQ If an external device provides a human interface for authentifying the user, this device shall guarantee the VAD confidentiality and audit trail necessary for the authentification method used. 2(6&$B'DWDB,QWHQG  'DWDWKDWPXVWEHVLJQHG The SCA: (a) generates the representation of the DTBS that was presented as DTBS and which the signatory intends to sign in a form adapted to signature by the TOE; (b) sends the representation of the DTBS to the TOE and allows for the verification of the audit trail of the representation of the DTBS by the TOE; (c) attaches the signature produced by the TOE to the data or provides it separately.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 40 / 83  ,76(&85,7<5(48,5(0(176 This chapter presents the TOE security requirements. The functional requirements for the TOE defined in these chapters are those defined in protection profiles >5± @, >5 ± 66&' 7@ and >5 ± 66&' 7@ as well as in target >5 ± &/67@. Table 12 presents the distribution of the requirements for these three protection profiles and target >5±&/67@. /aB$?N :#&6-G3H) 445KK3LL 44 & =3I-O//0MD 404 & =3I-P /0/0MD /G,M# =3I& :W$Q$ +3# %3# = /0-C$!3#( & =89!. & FAU_SAA.1 FAU_SAA.1 M# =3I'&3# %3I36$ C /!3I3I$:# & FCS_CKM.1 FCS_CKM.1 FCS_CKM.1 FCS_CKM.3 FCS_CKM.3 FCS_CKM.4 FCS_CKM.4 FCS_CKM.4 FCS_CKM.4 FCS_COP.1 FCS_COP.1 FCS_COP.1 FCS_COP.1 FCS_COP.1 FCS_RND.1 FCS_RND.1 FCS_RND.2 FCS_RND.2 b"7-3#".$%& %5I$#& -C'&  FDP_ACC.1 FDP_ACC.1 FDP_ACC.1 FDP_ACC.2 FDP_ACC.2 FDP_ACF.1 FDP_ACF.1 FDP_ACF.1 FDP_ACF.1 FDP_DAU.1 FDP_DAU.1 FDP_ETC.1 FDP_ETC.1 FDP_ETC.1 FDP_ETC.1 FDP_IFC.1 FDP_IFC.1 FDP_ITC.1 FDP_ITC.1 FDP_ITC.1 FDP_ITC.1 FDP_ITT.1 FDP_ITT.1 FDP_RIP.1 FDP_RIP.1 FDP_RIP.1 FDP_RIP.1 FDP_RIP.1 FDP_SDI.2 FDP_SDI.2 FDP_SDI.2 FDP_SDI.2 FDP_UCT.1 FDP_UCT.1 FDP_UIT.1 FDP_UIT.1 FDP_UIT.1  .$-$&(  C%& " %3$.;%3!'&<6-3&( ( C%&  FIA_AFL.1 FIA_AFL.1 FIA_AFL.1 FIA_AFL.1 FIA_ATD.1 FIA_ATD.1 FIA_ATD.1 FIA_ATD.1 FIA_UAU.1 FIA_UAU.1 FIA_UAU.1 FIA_UAU.1 FIA_UAU.3 FIA_UAU.3 FIA_UAU.4 FIA_UAU.4 FIA_UID.1 FIA_UID.1 FIA_UID.1 FIA_UID.1 FIA_USB.1 FIA_USB.1 /0-C$!3#( & =8M.:*, 3 7&# %'&( : FMT_MOF.1 FMT_MOF.1 FMT_MOF.1 FMT_MOF.1 FMT_MSA.1 FMT_MSA.1 FMT_MSA.1 FMT_MSA.1 FMT_MSA.2 FMT_MSA.2 FMT_MSA.2 FMT_MSA.2 FMT_MSA.3 FMT_MSA.3 FMT_MSA.3 FMT_MSA.3 FMT_MTD.1 FMT_MTD.1 FMT_MTD.1 FMT_MTD.1 c:d,e5±66&'7@DQG>5±66&'7@ The user security attributes, TOE components and the associated statuses are: ¢"nk3x £'n:y3m\~ k$r'wux"um\~ k$r'w3w u¤s3€ r$swsko'w w(x(€ m3y'w k5€ n onnu3r$€ o'w k$q ‚w w(x(€ m$yw k |"w ow(y'n „x uy3uv"¥$k$pk3x o3t'o'w wx(€ m3y'w kn User Role Administrator/Signatory „x uy3uv€ p3€ w(€ o3t € now(€ u:po'w w(x(€ m3y'w kn User SCD/SVD Management Authorized/Non-authorized SCD Secure authorized SCD Importation No/Yes „x uy3uv3n:€ ¥pow(y3x k;r$x kow € up ow wx<€ m$yw k'n SCD Operational SCD No/Yes DTBS Sent by an authorized CSA No/Yes  '(),1,7,212)72()81&7,21$/6(&85,7<5(48,5(0(176  )$86HFXULW\$XGLW )$8B6$$ 3RWHQWLDOYLRODWLRQDQDO\VLV  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 43 / 83  )$8B6$$ The TSF shall be able to apply a group of rules while surveilling the audited events and indicate, according to these rules, a potential TSP violation.  )$8B6$$ The TSF shall apply the following rules for the surveillance of audited events: 1. Accumulation or combination of the known >SRVWLQJIROORZLQJDXGLWDEOHVHYHQWV@ for indicating a potential security violation; $VVLJQPHQW$XGLWDEOHHYHQWV - Modification of the operating mode by the environment (captor); - Attempted access control violation; - Memory autotest failure (ROM, E²PROM); - Audit trail failure on a directory/file, on a file header, on a TLV object, an I/O buffer, on a key or on a PIN Code; - Audit trail failure of the unknown generator and crypto processor. 2. Other rules: >GRQRWDSSO\@.   )&6&U\SWRJUDSKLF6XSSRUW )&6B&.0 *HQHUDWLQJFU\SWRJUDSKLFNH\V SSCD Iteration )&6B&.0 The TSF shall generate cryptographic keys in compliance with the cryptographic key generation algorithm >56$NH\JHQHUDWLRQ@ and with the specified sizes of >j ELWV@ cryptographic keys in respect of >VWDQGDUGV>5±$5($.@, >5±$5($.@@.   Crypto library iteration )&6B&.0 The TSF shall generate cryptographic keys according to a specified cryptographic key generation algorithm >56$ VLPSOH  DQG 56$&57@ with sizes of cryptographic keys of > ELWV@ that respect >WKH VWDQGDUG 5HJXOLHUXQJVEHK|UGH IU 7HOHNRPPXQLFDWLRQ XQG 3RVW %HNDQQWPDFKXQJ ]XU HOHNWURQLVFKHQ 6LJQDWXU QDFK GHP 6LJQDWXUJHVHWH] XQG GHU 6LJQDWXUYHURUGQXQJ *HUPDQ %XQGHVDQ]HLJHU 1U ªS)HEUXDU\WK@   )&6B&.0 &U\SWRJUDSKLFNH\DFFHVV )&6B&.0 The TSF shall create >SRVWLQJ DFFHVV WR FU\SWRJUDSKLF NH\V@ in compliance with a specified >SRVWLQJ DQ DFFHVV PHWKRG IRU FU\SWRJUDSKLF NH\V@ that satisfies the following standards: >QRWDSSOLFDEOH@ $VVLJQPHQW $FFHVV7\SH Access to SCD/SVDs in read/write mode for performing SCD/SVD generation/destruction operations and for loading SCD/SVD in the cryptographic processing blocks for electronic signature generation.  &U\SWRJUDSKLFNH\DFFHVVPHWKRG Access in read/write mode of the code executed in ROM towards a key stored in the E²PROM by featuring RAM audit trail protection and confidentiality element signalling. )&6B&.0 'HVWUXFWLRQRIFU\SWRJUDSKLFNH\V )&6B&.0 The TSF shall destroy the cryptographic keys in compliance with a specified >SRVWLQJ PHWKRG IRU GHVWUR\LQJ FU\SWRJUDSKLF NH\V@ that satisfies the following standards: >QRW DSSOLFDEOH@  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 44 / 83 $VVLJQPHQW 'HVWUXFWLRQ0HWKRG Deletion of the EEPROM memory containing the key. 66&' 5HILQHPHQW The SCDs are destroyed upon request by the Signatory or by the Administrator. The destruction of the existing SCD is mandatory prior to re-generation by the TOE of the SCD/SVD pair or re-loading of the SCD in the TOE. )&6B&23 &U\SWRJUDSKLFRSHUDWLRQ Iteration )&6B&23 The TSF shall execute >SRVWLQJ OLVW RI FU\SWRJUDSKLF RSHUDWLRQV@ in compliance with a specified cryptographic algorithm >SRVWLQJ FU\SWRJUDSKLF DOJRULWKP@ and with the sizes of cryptographic keys >SRVWLQJ VL]HV RI FU\SWRJUDSKLF NH\V@ that satisfy the following: >SRVWLQJOLVWRIVWDQGDUGV@. $VVLJQPHQW 6HH7DEOH&U\SWRJUDSKLFRSHUDWLRQV z${ |}5uv"rx ¦3'wu3¥x o33s$€ ruk3x ow(€ upn ‚9t ¥3u:x<€ w(s$§n ¨k¦ n3€ ©'kn z3€ nwuv3nw o3pq$o$xqn Calculation of authentification cryptogrammes MAC RETAIL 112 bits ISO 9797-1 – Algo n° 3 MAC Calculation MAC RETAIL 112 bits ISO 9797-1 – Algo n° 3 Encryption/decryption TDES 112 bits ISO 10116 / X9.52-1998 Calculation of cryptogramme authentification card RSA 1024 to 2048 bits ISO9796-2 coupled with CVC Calculation of SSL cryptogramme authentification RSA 1024 to 2048 bits Signature PKCS#1 V2.1 – padding v 1.5 Asymmetrical decryption RSA 1024 to 2048 bits Encryption PKCS#1 V2.1 – padding v 1.5 Verification of the SCD/SVD correspondence Calculation of RSA key 1024 to 2048 bits Signature PKCS#1 V2.1 – padding v 1.5 Electronic signature creation RSA 1024 to 2048 bits Signature PKCS#1 V2.1 – padding v 1.5 HASH Calculation DTBS-Hash N/A SHA-1 and SHA-2 ª «a¬Y­ ® ‚ «¯ ‚9¨ ¬Y° , ª «¬¬ ® ‚ «¯ ‚9¨± ° £ ª «¬E²®5¯«« ‚M}¢^³ ° DH key exchange DH 1024 to 2048 bits ª «¬E­ ® ‚ «¯ ‚9¨ ¬Y° , ª «¬¬Œ® ‚ «^¯ ‚9¨± ° 7DEOH&U\SWRJUDSKLFRSHUDWLRQV Crypto library iteration )&6B&23 The TSF shall execute >SRVWLQJ OLVW RI FU\SWRJUDSKLF RSHUDWLRQ@ in compliance with a cryptographic algorithm >SRVWLQJ FU\SWRJUDSKLF DOJRULWKP@ and with sizes of specified cryptographic keys >SRVWLQJ VL]HV RI FU\SWRJUDSKLF NH\V@ that satisfy: >SRVWLQJ OLVW RI VWDQGDUGV@. $VVLJQPHQW 6HH7DEOH&U\SWRJUDSKLF2SHUDWLRQV    : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 45 / 83 7DEOH&U\SWRJUDSKLF2SHUDWLRQV )&6B51' 4XDOLW\PHDVXUHPHQWRIUDQGRPQXPEHUV )&6B51' The TSF shall provide a mechanism for generating random numbers that satisfy >SRVWLQJ DGHILQHGPHDVXUHRITXDOLW\@. $VVLJQPHQW 'HILQHDTXDOLW\PHDVXUH  Requirement for providing an entropy of at least 7.976 bits in every octet. )&6B51' *HQHUDWLRQRIUDQGRPQXPEHUV )&6B51' The TSF shall provide a mechanism for generating random numbers that respects standard: >$16, ; FRPPH GpFULW GDQV $ 0HQH]HV 3 YDQ 2RUVKRW DQG 6 9DQVWRQH+DQGERRNRI$SSOLHG&U\SWRJUDSK\&5&3UHVV@. Scope note: due to the specific characteristics of the smart card (e.g.. absence of a real time clock), the random number generator does not strictly follow this standard. Rather, it is based on this standard for the purpose of improving the quality of the random number generator. The implementation of the random number generator differs from the standard hereabove in the following manner: - The random numbers originating from the material random number generator are used for initialising the pseudo generator (software), and not as a "time stamp” as suggested in the standard. - After each reset of the TOE, the internal status is completely reinitialized. - After generation of several random octets, the random number generator is reinitialized with its own output.  )'38VHUGDWDSURWHFWLRQ )'3B$&& 3DUWLDODFFHVVFRQWURO SSCD Iteration )'3B$&& 6)3,QLWLDOLVDWLRQ The TSF must apply the >6)3LQLWLDOLVDWLRQ@ during >JHQHUDWLRQRIWKH6&'69'SDLU@ by the user. SSCD Iteration )'3B$&& The TSF must apply >6)3SHUVRQDOL]DWLRQ@ during >5$'FUHDWLRQ@ by the administrator. z${ |}5uv"rx ¦3'wu3¥x o33s$€ ruk3x ow(€ upn ‚9t ¥3u:x<€ w(s$§n ¨k¦ n3€ ©'kn z3€ nwuv3nw o3pq$o$xqn Encryption/decryption TDEA 112 or 168 bits FIPS PUB 46-3 federal information processing standards publication data encryption standard (DES) reaffirmed 1999 October 25, keying option 1 and 2. Encryption/decryption Triple-DES, modes ECB, CBC, or CBC-MAC 112 or 168 bits ANSI X9.52-1998 (mode ECB and CBC), FIPS PUB 81 (mode ECB and CBC) ISI 9797-1, algorithm 1 (mode CBC-MAC). Generation of cryptographic checksum SHA-1 None FIPS 180-1 Encryption/decryption RSA/RSA-CRT 1024 to 2048 bits Schneier page 468 or Meenezes, Van Oorshot and Vanstone section 8.2 and also standard ISO/IEC 9796 Annex A, section A.4  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 46 / 83 6)3 3HUVRQDOL]DWLRQ SSCD Iteration )'3B$&& 6)369'7UDQVIHU The TSF shall apply the >6)37UDQVIHURI69'@ during >69'LPSRUWDWLRQRUH[SRUWDWLRQ@ by the user. SSCD Iteration )'3B$&& 6)3VLJQDWXUH FUHDWLRQ The TSF shall apply the >6)3VLJQDWXUHFUHDWLRQ@ during: 1. >WUDQVPLVVLRQRI'7%6UHSUHVHQWDWLRQVE\WKH6&$@, 2. >VLJQDWXUHRIWKH'7%6UHSUHVHQWDWLRQVE\WKH6LJQDWRU\@. SSCD Iteration )'3B$&& 6)36&' ,PSRUWDWLRQ The TSF shall apply the >6)3,PSRUWDWLRQRI6&'@ during >XVHU6&'LPSRUWDWLRQ@. )'3B$&& 7RWDODFFHVVFRQWURO Iteration )'3B$&& $33/, The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR ,$6H*29 VHUYLFHV@ to the >SRVWLQJOLVWRIVXEMHFWV DQGREMHFWV@and to all operations on the subjects and objects covered by the SFP. $VVLJQPHQW /LVWRIVXEMHFWV - SUB_GEST, SUB_APPLI, SUB_IPA; /LVWRIREMHFWV - SUB_APPLI, SUB_IPA; $FFHVVFRQWUROWR³,$6H*29´VHUYLFHV - SUB_IPA is not selectable; - Only SUB_GEST activates SUB_APPLI if the command "SELECT” bears on the IAS-eGOV application; - SUB_GEST forbids the call to a service of a subject by another subject if the said call is not valid; - SUB_APPLI processes a command if the command format is valid; )'3B$&& $33/, The TSF shall ensure that all operations between every TSC subject and every TSC object are covered by an SFP access control. Iteration )'3B$&& ),/( The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR ILOHV@ to the >SRVWLQJ OLVW RI VXEMHFWV DQG REMHFWV@ and to all operations on the subjects and objects covered by the SFP. $VVLJQPHQW /LVWRIVXEMHFWV - SUB_APPLI, SUB_GF; /LVWRIREMHFWV - SUB_GF, OB_DFILE, OB_EFILE; )LOHDFFHVVFRQWURO - SUB_APPLI accesses objects OB_DFILE and OB_EFILE only if an application is selected and if these objects are accessible by the selected application; - SUB_APPLI accesses objects OB_DFILE and OB_EFILE only by  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 47 / 83 SUB_GF; - SUB_GF creates on behalf of SUB_APPLI an oB_DFILE or an oB_EFILE in the current OB_DFILE only if the status of the current OB_DFILE is coherent with the operation and if the access conditions of this OB_DFILE for creation are verified; - SUB_GF never creates in user phase and on behalf of SUB_APPLI an OB_DFILE or an OB_EFILE in an OB_DFILE if this OB_DFILE is not under the current ADF and is not under the current DF; - SUB_GF never creates in user phase and on behalf of SUB_APPLI an OB_DFILE of the ADF type; - SUB_GF deletes on behalf of SUB_APPLI a OB_DFILE or a current OB_EFILE only if the status of the file is coherent with the operation and if the access conditions for the deletion of this object are verified; - SUB_GF never deletes in user phase and on behalf of SUB_APPLI an OB_DFILE if this OB_DFILE contains an OB_DFILE or an OB_EFILE or if the OB_DFILE to be deleted is the MF or an ADF; - SUB_GF accesses for read/write operations on behalf of SUB_APPLI to data stored in an OB_EFILE only if the object OB_EFILE is audit trail protected, if its status is coherent with the operation and if the access conditions in read/write on this OB_EFILE are verified; - SUB_GF accesses for operations of activation, deactivation or termination of an object OB_DFILE or OB_EFILE if the status of the object accessed is coherent with the operation and if the access conditions in activation, deactivation or termination on this object are verified; )'3B$&& ),/( The TSF shall ensure that all operations between every TSC subject and every TSC object, are covered by an SFP access control. Iteration )'3B$&& 7/9 The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR 7/9 SDUDPHWHUV@ to the >SRVWLQJOLVWRIVXEMHFWV DQGREMHFWV@ and to all operations on the subjects and objects covered by the SFP. $VVLJQPHQW /LVWRIVXEMHFWV - SUB_APPLI, SUB_GT; /LVWRIREMHFWV - SUB_GT, OB_DFILE, OB_TLV; 7/9SDUDPHWHUVDFFHVVFRQWURO - SUB_APPLI access OB_TLV objects only through SUB_GT; - SUB_GT creates on behalf of SUB_APPLI an OB_TLV in the current OB_DFILE only if the status of the current OB_DFILE is coherent with the operation and if the access conditions for the creation of this OB_DFILE are verified; - SUB_GT accesses in read / write mode to parameters stored in a OB_TLV, on behalf of SUB_APPLI, only if the access conditions for the operation de read/write on this OB_TLV are verified; )'3B$&& 7/9 The TSF shall ensure that all operations between every TSC subject and every TSC object, are covered by an SFP access control. Iteration )'3B$&& 6(& The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR VHFUHWV@ to >SRVWLQJ OLVW RI VXEMHFWV DQG REMHFWV@ and to all the operations on the subjects and objects covered by the SFP.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 48 / 83 $VVLJQPHQW /LVWRIVXEMHFWV - SUB_APPLI, SUB_CRYPTO, SUB_GS; /LVWRIREMHFWV - SUB_GS, OB_FILE, OB_SECRET, SUB_CRYPTO; $FFHVVFRQWUROWRVHFUHWV - Only SUB_CRYPTO and SUB_APPLI access OB_SECRET objects and only through SUB_GS; - SUB_GS never accesses in read mode values of symmetrical keys or private keys of asymmetrical bi-keys or of a PIN Code, contained in OB_SECRET on behalf of SUB_APPLI; - SUB_GS creates on behalf of SUB_APPLI a OB_SECRET in the directory OB_DFILE current if the access conditions and the status de this OB_DFILE for the creation are verified; - SUB_GS accesses OB_SECRET in write mode on behalf of SUB_APPLI or SUB_CRYPTO if the OB_SECRET displays the Created or Activated status and if the access conditions and the status of the object OB_SECRET for a write operation are verified; - SUB_GS accesses on behalf of SUB_APPLI, for activation operations, deactivation or termination of an OB_SECRET object if the status of the secret is coherent with the operation and if the access conditions for the operation on this object are verified; - SUB_GS accesses on behalf of SUB_APPLI, for the releasing operation of an OB_SECRET object if the status of the secret is coherent with the operation and if the access conditions for the operation on the secret counter(s), are verified; - SUB_GS transfers the OB_SECRET into the cryptographic processing blocks on behalf of SUB_CRYPTO if the access conditions for the secret utilization are verified and if the audit trail OB_SECRET is protected and unobstructed; - SUB_CRYPTO performs a cryptographic operation on behalf of SUB_APPLI with the OB_SECRET transferred into the cryptographic processing blocks; - SUB_APPLI accesses SUB_CRYPTO for cryptographic operations with OB_SECRETs if the key and algorithm used are coherent for cryptographic operation; )'3B$&& 6(& The TSF shall ensure that all operations between every TSC subject and every TSC object, are covered by an SFP access control. SSCD Iteration )'3B$&& The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR VHFXUH HOHFWURQLF VLJQDWXUHVHFUHWV@ to the >SRVWLQJ OLVW RI VXEMHFWV DQG REMHFWV@ and to all operations on the subjects and objects covered by SFP. $VVLJQPHQW /LVWRIVXEMHFWV - Signatory; - Administrator; /LVWRIREMHFWV - SCD; - SVD; - DTBS; $FFHVVFRQWUROWRVHFUHWVRI³VHFXUHHOHFWURQLFVLJQDWXUH´  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 49 / 83 - SCD/SVD objects are accessible in write mode for generation of an SCD/SVD pair only if the user is the signatory or the administrator and if the user has the management rights for SCD/SVD objects; - SCD/SVD objects are accessible in write mode for destruction of an SCD/SVD pair only if the user is the signatory or the administrator; - SCD objects are never accessible in read mode for an exportation; - SVD objects are accessible in read mode for exportation of an SVD only if the user is the administrator or the signatory; - SCD objects are accessible in utilization mode for creation of a signature on DTBS objects only if the user is the signatory using an “operational” SCD for signing DTBS; - DTBS objects are accessible in write mode for loading a “DTBS representation” only if the CSA is authorized; - DTBS objects are not accessible in read mode for signature creation with an operational SCD if the DTBS object has not been sent by an authorized CSA; )'3B$&& The TSF shall ensure that all operations between every TSC subject and every TSC object are covered by an SFP access control.  )'3B$&) $FFHVVFRQWUROEDVHGRQVHFXULW\DWWULEXWHV Iteration )'3B$&) $33/, The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR ³,$6H*29´ VHUYLFHV@ to objects according to >SRVWLQJWKHOLVWRIVHFXULW\DWWULEXWHV@.  )'3B$&) $33/, The TSF shall apply the following rules for determining whether an operation between controlled subjects and objects is authorized or not. $VVLJQPHQW 5XOHV 1. SUB_GEST activates SUB_APPLI upon reception of a "SELECT" command if: - The FRPPDQGKHDGHULVcoherent with the status of the OLIHSKDVH FDUG; - The FRPPDQGKHDGHU is valid and corresponds to a “SELECT” command of the IAS-eGOV application; - The GLUHFWRU\ILOH FKHFNVXPof SUB_APPLI is correct; 2. SUB_GEST prohibits calling a service if: - The subject called and the subject calling are not coherent with the VHUYLFHVWDEOH; 3. SUB_APPLI processes the command received if: - The FRPPDQGKHDGHULVcoherent with the status of the OLIHSKDVH FDUG and the statusILOH of the selected ADF; - The FRPPDQGKHDGHU is coherent with the SUB_APPLI DSSOLFDWLRQ VWDWXV; /LVWRIVHFXULW\DWWULEXWHV - Command header; - Table of services; - Life phase card; - Application status; - Checksum file/directory; - Status file; )'3B$&) $33/, The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 50 / 83 )'3B$&) $33/, The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV 1. SUB_GEST does not activate SUB_IPA if: - /LIHSKDVHFDUG is: USER, BLOCKED or END OF LIFE; Iteration )'3B$&) ),/( The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR ILOHV@ to objects according to >SRVWLQJWKHOLVWRIVHFXULW\DWWULEXWHV@.  )'3B$&) ),/( The TSF shall apply the following rules for determining whether an operation between controlled subjects and objects is authorized or not. $VVLJQPHQW 5XOHV 1. SUB_APPLI activates SUB_GF for performing operations of creation / deletion / reading / writing / activation / deactivation / termination on an OB_DFILE / OB_EFILE if the FRPPDQGKHDGHU and the W\SHRIREMHFW are coherent; 2. SUB_GF performs the creation operation of an OB_DFILE / OB_EFILE file in a current OB_DFILE if: - The W\SHRIREMHFWof the file created is DF or EF; - The statusILOH of the current file is coherent with the operation; - The '$&LVcoherent with the VHFXULW\FDUGVWDWXV; 3. SUB_GF performs the deletion operations of a current OB_DFILE / OB_EFILE file if: - The W\SHRIREMHFWof the deleted file is different from MF; - The statusILOH of the current file to be deleted is coherent with the operation; - The '$&LVcoherent with the VHFXULW\FDUGVWDWXV; - For an OB_DFILE, it does not contain any object or objects of a SECRET or TLV type (these latter are then destroyed); 4. SUB_GF performs the read / write operations in a current OB_DFILE / OB_EFILE file if: - The FKHFNVXPGLUHFWRU\ILOH of the accessed file is correct; - The statusILOH of the accessed file is coherent with the operation; - The '$& is coherent with the VHFXULW\FDUGVWDWXV; 5. SUB_GF performs the activation / deactivation and termination operations of a current OB_DFILE / OB_EFILE if: - The W\SHRIREMHFWof the deleted file differs from the MF; - The statusILOH of the accessed file is coherent with the operation; - The '$&LVcoherent with the VHFXULW\FDUGVWDWXV; /LVWRIVHFXULW\DWWULEXWHV - Command header; - Type of object; - Checksum directory/file; - DAC; - Security card status; - Status file; )'3B$&) ),/( The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules : >SRVWLQJQRWDSSOLFDEOH@.   )'3B$&) ),/( The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV 1. SUB_GF never accesses in creation / write / read / activation / deactivation /  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 51 / 83 termination mode if the W\SHRIREMHFW of the OB_FILE accessed is SECRET or TLV; 2. SUB_GF never accesses in user phase in creation of an OB_DFILE / OB_EFILEin a current OB_DFILE if: − The OLIHSKDVHFDUG is: BLOCKED and END OF LIFE; − The VHFXULW\FDUGVWDWXV does not indicate that an SMI is valid; − The file created is of the MF or ADF W\SH; − The VWDWXVILOH of the current OB_DFILE is Deactivated or Terminated; 3. SUB_GF never accesses in deletion of an OB_DFILE / OB_EFILE in a current OB_DFILE if: - The OLIHSKDVHFDUG is: BLOCKED and END OF LIFE; - The object deleted is of W\SH MF, ADF; 4. SUB_GF never accesses in activation of a current OB_DFILE / OB_EFILE if: - The VWDWXVILOHof the current file is Terminated; 5. SUB_GF never accesses in deactivation of an OB_DFILE/OB_EFILE current if: - The VWDWXVILOHof the current file is Terminated; - The current file is of W\SHMF; 6. SUB_GF never accesses in termination of an OB_DFILE / OB_EFILE if: - The file is W\SHMF; - The file is not the current file; Iteration )'3B$&) 7/9 The TSF shall apply the >SRVWLQJ 6)3 DFFHVV FRQWURO WR 7/9 SDUDPHWHUV@ to objects according to >SRVWLQJWKHOLVWRIVHFXULW\DWWULEXWHV@.  )'3B$&) 7/9 The TSF shall apply the following rules for determining whether an operation between controlled subjects and objects is authorized or not. $VVLJQPHQW 5XOHV 1. SUB_APPLI activates SUB_GT for performing the creation / read / write operations in an OB_TLV if WKHFRPPDQGKHDGHU and the W\SHRIREMHFW are coherent; 2. SUB_GT creates an OB_TLV in a current OB_DFILE if: - The current OB_DFILE statusILOH is coherent with the operation; - The '$&LVcoherent with the VHFXULW\FDUGVWDWXV; 3. SUB_GT performs the read / write operations in an OB_TLV if: - The FKHFNVXP7/9 of OB_TLV is correct; - The '$& is coherent with the VHFXULW\FDUGVWDWXV; /LVWRIVHFXULW\DWWULEXWHV - Command header; - Type of object; - Checksum TLV; - DAC; - Security card status; - File status; )'3B$&) 7/9 The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 7/9 The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV 1. SUB_GT never accesses an OB_TLV in deletion; Iteration )'3B$&) The TSF shall apply the >SRVWLQJ6)3DFFHVVFRQWUROWRVHFUHWV@to objects according to  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 52 / 83 6(& >SRVWLQJWKHOLVWRIVHFXULW\DWWULEXWHV@.  )'3B$&) 6(& The TSF shall apply the following rules for determining whether an operation between controlled subjects and objects is authorized or not. $VVLJQPHQW 5XOHV 1. SUB_APPLI activates SUB_GS for accessing OB_SECRET if WKHFRPPDQG KHDGHUand the W\SHRIREMHFW are coherent; 2. SUB_GS performs the creation operation of an OB_SECRET in a current OB_DFILE if: - The statusILOH of the OB_DFILE current is coherent for the operation; - Le '$& is coherent with the VHFXULW\FDUGVWDWXV; 3. SUB_GS accesses an OB_SECRET in write / read / unlocking / activation / deactivation / termination if: - The VHFUHW statusof the OB_SECRET is coherent with the operation; - The UDWLILFDWLRQJURXS or the XWLOL]DWLRQFRXQWHU or the HUURUFRXQWHU of the OB_SECRET do not indicate that the secret is locked for read / write / activation / deactivation / termination operations; - The '$&of the secret agrees with the VHFXULW\FDUGVWDWXV for the operation 4. SUB_GS performs the activation / desactivation and termination operations of an OB_SECRET if: - The VWDWXVRIWKHVHFUHW is coherent with operation; - The '$&of the secret is coherent with the VHFXULW\FDUGVWDWXV; 5. SUB_GS accesses the transfer of an OB_SECRET in the cryptographic processing blocks on behalf of SUB_CRYPTO if the: - NH\W\SHDQGDOJRULWKPW\SHare coherent; - UDWLILFDWLRQ JURXS the XVDJHFRXQWHU or the HUURUFRXQWHU do not indicate that the secret is locked; - FKHFNVXPGLUHFWRU\ILOHcontaining OB_SECRETLVcorrect; - VHFUHW VWDWXV of secret OB_SECRET is “activated”; - '$&of the secret OB_SECRET agrees with the VHFXULW\FDUGVWDWXV /LVWRIVHFXULW\DWWULEXWHV - Type of key; - Type of algorithm; - Ratification group; - Checksum directory/file; - DAC; - Security card status; - Secret status; - File status; )'3B$&) 6(& The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 6(& The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV 1. SUB_GS never accesses, in read mode on behalf of SUB_APPLI, the values for symmetrical keys of private keys of asymmetrical bi-keys or of a PIN Code contained in OB_SECRET; 2. SUB_GS never accesses, in write mode, an OB_SECRET on behalf of SUB_APPLI, if the VHFXULW\FDUGVWDWXV does not indicate that an SMI and a SMC are valid; 3. SUB_GS never deletes an OB_SECRET;  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 53 / 83 SSCD Iteration )'3B$&) 6)3,QLWLDOLVDWLRQ The TSF shall apply the >SRVWLQJ 6)3 LQLWLDOLVDWLRQ@ to objects according to >SRVWLQJ 7KHJURXSRIJHQHUDODWWULEXWHV@ and >SRVWLQJ7KHJURXSRILQLWLDOLVDWLRQDWWULEXWHV@.  )'3B$&) 6)3,QLWLDOLVDWLRQ The TSF shall apply the following rules for determining whether an operation between controlled subjects and objects is authorized or not. $VVLJQPHQW 5XOHV 1. The user for whom the security attribute role is defined at Administrator or at Signatory and for whom the security attribute 6&'69'PDQDJHPHQWis defined at Authorized may generate an SCD/SVD pair. )'3B$&) 6)3,QLWLDOLVDWLRQ The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 6)3,QLWLDOLVDWLRQ The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV 1. The user for whom the security attribute role is defined at Administrator or at Signatory and for whom the security attribute PDQDJHPHQWGHV6&'69' is defined at Non-authorized may not generate an SCD/SVD pair. SSCD Iteration )'3B$&) 6)3 3HUVRQDOL]DWLRQ The TSF shall apply the >SRVWLQJSHUVRQDOL]DWLRQ6)3@to objects according to >SRVWLQJ 7KHJURXSRIJHQHUDODWWULEXWHV@.  )'3B$&) 6)3 3HUVRQDOL]DWLRQ The TSF shall apply the following rules for determining whether an operation between controlled subjects and controlled objects is authorized. $VVLJQPHQW 5XOHV 1. The user for whom the security attribute role is defined at Administrator is authorized to create an RAD. )'3B$&) 6)3 3HUVRQDOL]DWLRQ The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 6)3 3HUVRQDOL]DWLRQ The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJQRW DSSOLFDEOH@. SSCD Iteration )'3B$&) 6)369'7UDQVIHU The TSF shall apply the >SRVWLQJ 6)3 7UDQVIHUW RI 69'@ to objects according to >SRVWLQJ7KHJURXSRIJHQHUDODWWULEXWHV@.  )'3B$&) 6)369'7UDQVIHU The TSF shall apply the following rules for determining whether an operation between controlled subjects and controlled objects is authorized. $VVLJQPHQW 5XOHV 1. The user for whom the security attribute role is defined at Administrator or at Signatory is authorized to export SVDs. )'3B$&) The TSF shall explicitly authorize the access of subjects to objects according to the  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 54 / 83 6)369'7UDQVIHU following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 6)369'7UDQVIHU The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJQRW DSSOLFDEOH@. SSCD Iteration )'3B$&) 6)3VLJQDWXUH FUHDWLRQ The TSF shall apply the >SRVWLQJ 6)3 VLJQDWXUH FUHDWLRQ@ to objects according to >SRVWLQJ 7KH JURXS RI JHQHUDO DWWULEXWHV@ and >SRVWLQJ 7KH JURXS RI VLJQDWXUH FUHDWLRQDWWULEXWHV@.  )'3B$&) 6)3VLJQDWXUH FUHDWLRQ The TSF shall apply the following rules for determining whether an operation between controlled subjects and controlled objects is authorized. $VVLJQPHQW 5XOHV 1. The user for whom the security attribute role is defined at Signatory is authorized to create electronic signatures for the DTBS sent by an authorized SCA, with SCDs by the Signatory for whom the 6&'RSHUDWLRQDO security attribute is defined at Yes.  )'3B$&) 6)3VLJQDWXUH FUHDWLRQ The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules: >SRVWLQJQRWDSSOLFDEOH@. )'3B$&) 6)3VLJQDWXUH FUHDWLRQ The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV (a) The user for whom the security attribute role is defined at Signatory is not authorized to create electronic signatures for the DTBS that are not sent by an authorized SCA, with Signatory SCDs for whom the 6&'RSHUDWLRQDO security attribute is defined at Yes. (b) The user for whom the security attribute role is defined at Signatory is not authorized to create electronic signatures for the DTBS sent by an authorized SCA, with Signatory SCDs for whom the SCD operational security attribute is defined at No. SSCD Iteration )'3B$&) 6)36&' ,PSRUWDWLRQ The TSF shall apply the >SRVWLQJ 6)3 ,PSRUWDWLRQ RI 6&'@ to objects according to >SRVWLQJ 7KH JURXS RI JHQHUDO DWWULEXWHV@ and >SRVWLQJ 7KH JURXS RI LQLWLDOLVDWLRQ DWWULEXWHV@.  )'3B$&) 6)36&' ,PSRUWDWLRQ The TSF shall apply the following rules for determining whether an operation between controlled subjects and controlled objects is authorized. $VVLJQPHQW 5XOHV 1. The user for whom the security attribute role is defined at Administrator or Signatory and with the 6&'69'0DQDJHPHQWsecurity attribute positioned at Authorized is authorized to import SCDs if the security attribute 3URWHFWHG,PSRUWDWLRQRI DXWKRUL]HG 6&'is positioned at Yes. )'3B$&) 6)36&' ,PSRUWDWLRQ The TSF shall explicitly authorize the access of subjects to objects according to the following complementary rules : >SRVWLQJQRWDSSOLFDEOH@.  )'3B$&) The TSF shall explicitly refuse the access of subjects to objects according to >SRVWLQJ  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 55 / 83 6)36&' ,PSRUWDWLRQ 6SHFLILFUXOHV@. $VVLJQPHQW 6SHFLILFUXOHV (a) The user for whom the security attribute role is defined at Administrator or Signatory and with the 6&'69' 0DQDJHPHQWsecurity attribute positioned at Unauthorized is not authorized to import SCDs if the security attribute 3URWHFWHG LPSRUWDWLRQRIDXWKRUL]HG 6&'is positioned at Yes. (b) The user for whom the security attribute role is defined at Administrator or Signatory and with the 6&'69' 0DQDJHPHQW security attribute positioned at Authorized is not authorized to import SCDs if the 3URWHFWHGLPSRUWDWLRQRI DXWKRUL]HG 6&'security attribute is positioned at No. )'3B'$8 $XWKHQWLILFDWLRQRIHOHPHQWDU\GDWD Iteration )'3B'$8 The TSF shall offer a capacity to generate proof that may be used as a guarantee of the validity of >SRVWLQJ/LVWRIREMHFWVRUW\SHVRIIROORZLQJLQIRUPDWLRQ@ $VVLJQPHQW /LVWRIREMHFWVDQGLQIRUPDWLRQ - OB_SECRET (keys and PIN codes); - OB_FILE (contained file); - OB_TLV (des data proprietary application); )'3B'$8 The TSF shall offer to >SRVWLQJ OLVW RI VXEMHFWV@ the ability to prove the validity of information indicated. $VVLJQPHQW /LVWRIVXEMHFWV - SUB_APPLI; - SUB_GS; - SUB_GT; - SUB_GF; SSCD Iteration )'3B'$8  The TSF shall offer a capacity to generate proof that may be used as a guarantee of the validity of the >SRVWLQJ/LVWRIREMHFWVRUW\SHVRIIROORZLQJLQIRUPDWLRQ@ $VVLJQPHQW /LVWRIREMHFWVDQGLQIRUPDWLRQ - SCD - SVD; - RAD; - DTBS; )'3B'$8  The TSF shall offer to >SRVWLQJOLVWRIVXEMHFWV@ the ability to verify the proof of the validity of the information indicated. $VVLJQPHQW /LVWRIVXEMHFWV - Signatory; - Administrator; )'3B(7& ([SRUWDWLRQRIXVHUGDWDZLWKRXWVHFXULW\DWWULEXWHV Iteration )'3B(7& The TSF shall apply the >SRVWLQJOLVWRI6)3DFFHVVFRQWURO@ during exportation of user data, audited by the SFP(s), outwards from the TSC. $VVLJQPHQW /LVW6)3DFFHVVFRQWUROV - SFP access control to "IAS-eGOV" services;  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 56 / 83 - SFP access control to files; - SFP access control to TLV parameters; - SFP access control to secrets; )'3B(7& The TSF shall export user data without the security attributes associated with user data.  SSCD Iteration )'3B(7& 69'7UDQVIHU The TSF shall apply the >SRVWLQJ6)37UDQVIHUWRI69'@ during exportation of user data, audited by the SFP(s), outwards from the TSC. )'3B(7& 69'7UDQVIHU The TSF shall export user data without the security attributes associated with user data.  )'3B,)& 3DUWLDO&RQWURORILQIRUPDWLRQIORZ )'3B,)& The TSF shall ensure the >SRVWLQJ6)3IRUFRQWURORILQIRUPDWLRQIORZ@ on all >SRVWLQJ OLVW RI VXEMHFWV LQIRUPDWLRQ DQG RSHUDWLRQV WKDW FKDQQHO WKH IORZ RI FRQWUROOHG LQIRUPDWLRQWRZDUGVDQGDZD\IURPFRQWUROOHGVXEMHFWVFRYHUHGE\WKH6)3@. The SFP Data Processing Policy is defined for requirement FDP_IFC.1 (Partial Control of Information Flow): user data and TSF data shall not be accessible from the TOE except for when the smart card embedded software decides to communicate the user data via an external interface. The protection shall apply to confidential data only but without distinction between the attributes controlled by the smart card embedded software. $VVLJQPHQW 6)3IRUFRQWUROOLQJLQIRUPDWLRQIORZ Data Processing Policy. $VVLJQPHQW /LVWRIVXEMHFWVLQIRUPDWLRQDQGRSHUDWLRQVWKDWHQWDLODFRQWUROOHGLQIRUPDWLRQIORZ WRZDUGVDQGDZD\IURPFRQWUROOHGVXEMHFWVFRYHUHGE\WKH6)3 All confidential data when processed or transmitted by the TOE or the smart card embedded software. 5HILQHPHQW FDP.IFC.1 is refined for this composite assessment for including the resistance against secret information leaks as well (attacks by SPA, DPA, Timing) during the execution of DES, 3DES, SHA-1, RSA and RSA-CRT algorithms as well as during RSA key generation.  )'3B,7& ,PSRUWDWLRQRIXVHUGDWDZLWKRXWVHFXULW\DWWULEXWHV Iteration )'3B,7& The TSF shall apply the >SRVWLQJOLVWRI DFFHVVFRQWURO 6)3@ when importing user data checked by the SFP originating outside the TSC. 3RVWLQJ /LVWRI6)3DFFHVVFRQWUROV - SFP access control to “IAS-eGOV” services; - SFP access control to files; - SFP access control to TLV parameters; - SFP access control to secrets;  )'3B,7& The TSF shall ignore all security attributes associated with user data when they are imported from outside of the TSC.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 57 / 83 )'3B,7& The TSF shall apply the following rules during importation of user data controlled by the SFP originating outside of the TSC >FRPSOHPHQWDU\ UXOHV IRU LPSRUWDWLRQ FRQWURO QRW DSSOLFDEOH@  SSCD Iteration )'3B,7& 6&' The TSF shall apply the >SRVWLQJ6)3,PSRUWDWLRQRI6&'@ during importation of use data controlled by the SFP originating outside of the TSC. )'3B,7& 6&' The TSF shall ignorer all security attributes associated with user data when they are imported from outside of the TSC. )'3B,7& 6&' The TSF shall apply the following rules during importation of user data controlled by the SFP originating outside of the TSC: >7KH6&'PXVWEHVHQWE\DQDXWKRUL]HG66&'@  SSCD Iteration )'3B,7& '7%6 The TSF shall apply the >SRVWLQJ 6)3 VLJQDWXUH FUHDWLRQ@ during importation of user data controlled by the SFP originating outside of the TSC. )'3B,7& '7%6 The TSF shall ignorer all security attributes associated with user data when they are imported from outside of the TSC. )'3B,7& '7%6 The TSF shall apply the following rules during importation of user data controlled by the SFP originating outside of the TSC: >7KH '7%6 UHSUHVHQWDWLRQ PXVW EH VHQW E\ DQ DXWKRUL]HG&6$@ )'3B,77 %DVLFLQWHUQDOWUDQVIHUSURWHFWLRQ Crypto library iteration )'3B,77 The TSF shall ensure >SRVWLQJWKH6)3DFFHVVFRQWURO V DQGRUWKH6)3IORZ FRQWURO V @ for preventing the >VHOHFWLRQGLVFORVXUHPRGLILFDWLRQORVVRIXWLOL]DWLRQ@ of user data when it is transmitted between physically separated parts of the TOE. $VVLJQPHQW 6)3DFFHVVFRQWURODQGRU6)3IORZFRQWURO Data Processing Policy. 6HOHFWLRQ Disclosure. 5HILQHPHQW The different memories, the CPU and the other functional units of the TOE (e.g. a cryptographic co-processor) are considered as physically separated parts of the TOE. FDP_ITT.1 is refined for this composite assessment to include resistance against secret information leaks as well (attacks by SPA, DPA, Timing) during execution of DES, 3DES, SHA-1, RSA and RSA-CRT algorithms as well as during RSA key generation.  Crypto library iteration.  Basic internal transfer protection requires that the user data be protected when it is transmitted between different parts of the TOE. The TOE provides a safe copy routine that copies the data blocks in such a way that they are protected against certain attacks by covert channels. The following functional requirement is derived from component FDP_ITT.1 of the >5±&&@: )'3B,77 &23< The TSF shall ensure the >SRVWLQJ6)3DFFHVVFRQWURODQGRU6)3FRQWURORI LQIRUPDWLRQIORZ@ for preventing the disclosure of user data when it is transmitted between physically separated parts of the TOE.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 58 / 83 $VVLJQPHQW 6)3DFFHVVFRQWURODQGRU6)3LQIRUPDWLRQIORZFRQWURO Data Processing Policy 5HILQHPHQW The different TOE memories are considered as physically separated parts of the TOE. The TSF shall provide a safe copy routine that copies the data blocks in such a way that the confidentiality of the data is protected against certain attacks by covert channels.  )'3B5,3 3DUWLDOSURWHFWLRQRIUHVLGXDOLQIRUPDWLRQ Iteration )'3B5,3 The TSF shall ensure that all information previously contained in a resource is rendered inaccessible upon >VHOHFWLRQ UHVRXUFH GHDOORFDWLRQ@ for the following objects >SRVWLQJ /LVWRIREMHFWV@ $VVLJQPHQW /LVWRIREMHFWV - OB_SECRET; - OB_FILE; - OB_TLV; - OB_I/O; - OB_TEMP; SSCD Iteration )'3B5,3  The TSF shall ensure that all information previously contained in a resource is rendered inaccessible upon >VHOHFWLRQ UHVRXUFH GHDOORFDWLRQ@ of the following objects >SRVWLQJ /LVWRIREMHFWV@ $VVLJQPHQW /LVWRIREMHFWV - SCD; - VAD; - RAD;   Crypto library iteration. )'3B5,3 The TSF shall ensure that all previous information contained in a resource is rendered unavailable upon >VHOHFWLRQUHVRXUFHGHDOORFDWLRQ@ for the following objects: >3RVWLQJ DOOREMHFWVXVHGE\WKHFU\SWRJUDSKLFOLEUDU\DVVSHFLILHGLQWKHXVHUVJXLGHV@.  )'3B6', &RQWURORIWKHDXGLWWUDLOGDWDVWRUHGDQGDFWLRQWREHWDNHQ Iteration )'3B6', The TSF shall control the user data stored within the TSC for searching for >SRVWLQJDXGLW WUDLOHUURUVRQFKHFNVXP@ on all objects, based on the following attributes >SRVWLQJ/LVW RIDWWULEXWHV@ $VVLJQPHQW /LVWRIDWWULEXWHV - Directory and file checksum; - Secret checksum; - TLV checksum; - I/O buffer checksum before and after a SUB_CRYPTO operation; )'3B6', Should an audit trail error be detected, the TSF shall >SRVWLQJUHIXVHXVDJHRIFRUUXSWHG GDWD@. SSCD Iteration )'3B6', 3HUVLVWHQW'DWD The TSF shall control user data stored within the TSC that seeks >SRVWLQJ DXGLW WUDLO HUURUV@ on all objects, based on the following attributes >SRVWLQJ SHUPDQHQWO\ VWRUHG  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 59 / 83 GDWDZLWKDXGLWWUDLOUHYLHZ@ 5HILQHPHQW 3HUVLVWHQW'DWD ´  - SCD; - RAD; - SVD (if permanently stored in the TOE); )'3B6', 3HUVLVWHQW'DWD Should an audit trail error be detected, the TSF shall: 1. >UHIXVHXVDJHRIFRUUXSWHGGDWD 2. LQIRUPWKH6LJQDWRU\RIWKHDXGLWWUDLOHUURU@  Iteration )'3B6', '7%6 The TSF shall audit user data stored within the TSC that seeks >SRVWLQJ DXGLW WUDLO HUURUV@ on all objects, basing itself on the following attributes >SRVWLQJGDWDVWRUHGDYHF DXGLWWUDLOUHYLHZ@ 5HILQHPHQW 7HPSRUDU\'DWD µ  - The representation of the DTBS; )'3B6', '7%6 Should an audit trail error be detected, the TSF shall: 1. >UHIXVHXVDJHRIFRUUXSWHGGDWD 2. LQIRUPWKH6LJQDWRU\RIWKHDXGLWWUDLOHUURU@  )'3B8&7 )XQGDPHQWDOFRQILGHQWLDOLW\RIGDWDH[FKDQJHG )'3B8&7 5HFHSWLRQ The TSF shall apply the >6)3 ,PSRUWDWLRQ RI 6&'@ in order to >UHFHLYH@ the objects in such way as to protect from any unauthorized disclosure.   )'3B8,7 $XGLWWUDLOGDWDH[FKDQJH SSCD Iteration )'3B8,7 69'7UDQVIHU The TSF shall apply the >6)37UDQVIHUWRI69'@ in order to be able to >WUDQVPLW@ user data in such a way as to avoid >PRGLILFDWLRQ@ and >LQVHUWLRQ@ errors. )'3B8,7 69'7UDQVIHU The TSF shall be able to determine upon reception of user data whether a >PRGLILFDWLRQ@ or >LQVHUWLRQ@ have occurred.  SSCD Iteration )'3B8,7 72('7%6 The TSF shall apply the >VLJQDWXUH FUHDWLRQ 6)3@ in order to be able to >UHFHLYH@ user data in such a way as to avoid >PRGLILFDWLRQ@, >GHOHWLRQ@ and >LQVHUWLRQ@ errors. )'3B8,7 72('7%6 The TSF shall be able to determine upon reception of user data whether >PRGLILFDWLRQ@, >GHOHWLRQ@ or >LQVHUWLRQ@ have occurred.   ,GHQWLILFDWLRQDQGDXWKHQWLILFDWLRQ ),$  ),$B$)/ 0DQDJHPHQWRIDQDXWKHQWLILFDWLRQIDLOXUH Iteration ),$B$)/ The TSF shall detect the fact that >SRVWLQJ WKH QXPEHUV IROORZLQJ@ unsuccessful authentification attempts have occurred in relation with >SRVWLQJ WKH DXWKHQWLILFDWLRQ RI XVHUVRIWKHVHUYLFHVRIWKHMorpho-Citiz 32FDUGLQXVHUSKDVH@. $VVLJQPHQW 1XPEHUVRIDWWHPSWV 3 Data permanently stored by the TOE display the user data attribute “data permanently stored with audit trail storage” 4 The representation of the DTBS, temporarily stored by the TOE display the user data attribute “data stored with audit trail storage”  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 60 / 83 - 3 successive attempts to authentify the bearer; - 5 successive attempts to authentify the issuer; ),$B$)/ When the specified number of unsuccessful authentification attempts is reached or surpassed, the TSF shall >SRVWLQJ/LVWRIDFWLRQV@. $VVLJQPHQW /LVWRIDFWLRQV - PIN Code Blocking; - PUK code Blocking; SSCD Iteration ),$B$)/  The TSF shall detect the fact that >SRVWLQJ WKH IROORZLQJ QXPEHU RI@ unsuccessful authentification attempts have taken place following >IDLOXUHV RI FRQVHFXWLYH DXWKHQWLILFDWLRQDWWHPSWV@. $VVLJQPHQW 1XPEHURIDWWHPSWV - 5 successive authentification attempts by the signatory; ),$B$)/  When the specified number of unsuccessful authentification attempts has been reached or surpassed, the TSF shall >SRVWLQJEORFNWKH5$'@. 5HILQHPHQW When the RAD is blocked, any new authentification attempt shall fail. ),$B$7' 'HILQLWLRQRIXVHUDWWULEXWHV Iteration ),$B$7' The TSF shall maintain the following list of security attributes belonging to individual users: >SRVWLQJ/LVWRIVHFXULW\DWWULEXWHV@ $VVLJQPHQW /LVWRIVHFXULW\DWWULEXWHV - File status; - Secret status; - Security card status; SSCD Iteration ),$B$7'  The TSF shall maintain the following list of security attributes belonging to individual users: >SRVWLQJ5$'@ ),$B8$8 $XWKHQWLILFDWLRQSURJUDPPLQJ Iteration ),$B8$8 The TSF shall authorize that >SRVWLQJ DOO DFWLRQV SDVVLQJ WKURXJK WKH 76) H[FHSW WKRVHLGHQWLILHGEHORZ@ are performed on behalf of the user before he is authentified. $VVLJQPHQW /LVWRIXQDXWKRUL]HGDFWLRQVSULRUWRXVHUDXWKHQWLILFDWLRQ - Creation or deletion of a directory or file; - Life cycle management of a file; - Generation or addition of a secret; - Life cycle management of a secret; - Writing or reading of confidential user data; ),$B8$8 The TSF shall require every user to be successfully authentified prior to authorization of any other action passing through the TSF on behalf of this user.  SSCD Iteration ),$B8$8  The TSF shall authorize that >SRVWLQJ /LVW RI DFWLRQV@ are performed on behalf of the user before he is authentified.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 61 / 83 $VVLJQPHQW /LVWRIDFWLRQV 1. User identification by means of the TSF required by FIA_UID.1; 2. Creation of a channel of trust between the TOE and a Type 1 SSCD by means of the TSF required by FTP_ITC/SCD importation; 3. The creation of a web of trust between the local user and the TOE by means of the TSF required by FTP_TRP.1/TOE; 4. The creation of a channel of trust between the SCA and the TOE by means of the TSF required by FTP_ITC.1/Importation des DTBS; ),$B8$8  The TSF shall require that each user be successfully authentified prior to authorizing any other action passing through the TSF on behalf of this user.  1RWH The “local user” mentioned in the FIA_UAU.1.1 component is the user using the channel of trust provided between the SCA in the TOE environment and the TOE as mentioned by FTP_TRP.1/SCA and FTP_TRP.1/TOE. ),$B8$8 8QIRUJHDEOHDXWKHQWLILFDWLRQ ),$B8$8 The TSF shall >VHOHFWLRQSUHYHQW@ the utilization of authentification data that have been forged by any user of the TSF.  ),$B8$8 The TSF shall >VHOHFWLRQSUHYHQW@ the utilization of authentification data that have been copied by any other TSF user. ),$B8$8 6LQJOHXVHDXWKHQWLILFDWLRQPHFKDQLVPV Iteration ),$B8$8 The TSF shall hinder the re-use of authentification data linked to >SRVWLQJWKHOLVWRI DXWKHQWLILFDWLRQV@. $VVLJQPHQW /LVWRIDXWKHQWLILFDWLRQV - Issuer authentification; - Domain authorities authentification. SSCD Iteration ),$B8$8  The TSF shall prevent the reutilization of authentification data linked to >SRVWLQJWKHOLVW RIDXWKHQWLILFDWLRQV@. $VVLJQPHQW /LVWRIDXWKHQWLILFDWLRQV - Signatory Authentification; - Administrator Authentification. ),$B8,' ,GHQWLILFDWLRQ3URJUDPPLQJ Iteration ),$B8,' The TSF shall authorize that >SRVWLQJ$OODFWLRQVSDVVLQJWKURXJKWKH76)@ are performed on behalf of the user before he is identified.  ),$B8,' The TSF shall require that every user be successfully identified prior to authorizing any other action passing through the TSF on behalf of this user.  SSCD Iteration ),$B8,'  The TSF shall authorize the >SRVWLQJ/LVWRIDFWLRQV@ to be performed on behalf of the user before he is identified. $VVLJQPHQW /LVWRIDFWLRQV 1. Creation of a channel of trust between the TOE and a Type 1 SSCD by means of  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 62 / 83 the TSF required by FTP_ITC.1/SCD Importation; 2. Creation of a web of trust between the local user and the TOE by means of the TSF required by FTP_TRP.1/TOE; 3. Creation of a channel of trust between the SCA and the TOE by means of the TSF required by FTP_ITC.1/Importation of the DTBS;  ),$B8,'  The TSF shall require that every user be successfully identified prior to authorizing any other action passing through the TSF on behalf of this user. ),$B86% 8VHUVXEMHFWOLQN ),$B86% The TSF shall link the appropriate user security attributes with the subjects acting on behalf of this user.   )076HFXULW\0DQDJHPHQW The following actions are undertaken on behalf of the FMT functions management. ¶a·$¸ ¹2º3»º¼½$¾;½3»¿ ÀMÁ ¿ Ã» ¶a·$¸ ¹2º3»º¼½$¾;½3»¿ ÀMÁ ¿ Ã» ¶·$¸ ¹º$»º¼½$¾ ½$»¿ ÀMÁ ¿( Ã» FAU_SAA.1 NA FIA_AFL.1 a) FMT_MTD.1 a) FSC_CKM.3 a) FIA_ATD.1 a) Ä3Å,Æ<Ç0ÈÅÄ:É Ê ËaÅ FCS_CKM.4 a) FIA_UAU.1 a) FMT_SMR.1 NA FCS_COP.1 NM FIA_UAU.3 NM FPR_UNO.1 NA FDP_ACC.2 NM FIA_UAU.4 NM FPT_FLS.1 NM FDP_ACF.1 a) FIA_UID.1 NA FPT_PHP.3 NA FDP_DAU.1 a) FIA_USB.1 a) FPT_SEP.1 NM FDP_ETC.1 NM FMT_MOF.1 a) FPT_TDC.1 NM FDP_ITC.1 a) FMT_MSA.1 a) FPT_TST.1 NA FDP_RIP.1 NA FMT_MSA.2 NM FDP_SDI.2 NA FMT_MSA.3 a) NA : Not Applicable NM : No Management (no management action identified in the criteria) a) : CC Management Actions a) adopted )07B02) $GPLQLVWUDWLRQRIWKHEHKDYLRXURIVHFXULW\IXQFWLRQV Iteration )07B02) The TSF shall restrict the ability to >VHOHFWLRQGHWHUPLQHWKHEHKDYLRXURIGHDFWLYDWH DFWLYDWHPRGLI\WKHEHKDYLRXURI@ the >SRVWLQJOLVWRIIXQFWLRQV@to >SRVWLQJ DXWKRUL]HGLGHQWLILHGUROH@ functions. $VVLJQPHQW See Table 15: Behaviour/functions/roles SSCD Iteration )07B02)  The TSF shall restrict the ability to >VHOHFWLRQDFWLYDWH@ the >SRVWLQJVLJQDWXUHFUHDWLRQ IXQFWLRQ@functions to the >SRVWLQJ6LJQDWRU\@.  Ì ½3ͺ'Î: Ã"Ï$Ð ·$Ï:» Á ¿( Ã:»Ñ ¸^Ã:Ò ½Ñ Activate / deactivate Initialisation operations Pre-personalizer Activate / deactivate Personalization operations Personalizer Activate Secret creation Domain authorities or Issuer Activate Creation or deletion of directories or files Domain authorities or Issuer Activate Life cycle management of files or directories Domain authorities or Issuer Activate Life cycle management of a secret Domain authorities or Issuer  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 63 / 83 Deactivated Block a cryptographic key Domain authorities or Issuer Deactivated Block PIN Code Issuer Activate Change PIN Code Issuer or bearer Activated / Deactivated Block a cryptographic key except for keys SCD/SVD Domain authorities or Issuer Activated / Deactivated Block an SCD/SVD type cryptographic key Issuer and signatory Activate Loading of a cryptographic key except for SCD/SVD keys Domain authorities or Issuer Activate Generation or Loading of an SCD/SVD type cryptographic key Issuer and signatory Activate / Deactivate Block application Issuer 7DEOH%HKDYLRXUIXQFWLRQVUROHV )07B06$ $GPLQLVWUDWLRQRIVHFXULW\DWWULEXWHV Iteration )07B06$ The TSF shall implement the >SRVWLQJOLVWRIDFFHVVFRQWURO6)3@ in order to restrict the >SRVWLQJIROORZLQJDGPLQLVWUDWRUV@ with regards to >SRVWLQJH[HFXWLRQRIWKH IROORZLQJRSHUDWLRQV@ on the following security attributes: $VVLJQPHQW /LVWRI6)3DFFHVVFRQWURO - SFP access control to “IAS-eGOV” services; - SFP access control to files; - SFP access control to TLV parameters; - SFP access control to secrets; 7KH76)VKDOOUHVWULFWWKH - Issuer or the domain authority from re-initializing the PTC counter of the attribute UDWLILFDWLRQJURXS and the attribute XWLOL]DWLRQFRXQWHU - Issuer or the domain authority from modifying the VHFUHWVWDWXV attribute to “Activated”; - Issuer from modifying the DSSOLFDWLRQ VWDWXVattribute - Issuer or the domain authority from charging the ILOHW\SH, ILOHVWDWXV, and '$&attributes during creation of a directory or of a file in a directory belonging to his domain; - Domain authority or issuer from charging the NH\W\SH, '$& and VHFUHWVWDWXVattributes during addition of a secret. SSCD Iteration )07B06$ $GPLQLVWUDWRU The TSF shall implement the >SRVWLQJLQLWLDOLVDWLRQ6)3DQG6)3,PSRUWDWLRQRI6&'@ in order to restrict the >DGPLQLVWUDWRU@ from >PRGLI\LQJ@ the >6&'69'PDQDJHPHQWDQG SURWHFWHGLPSRUWDWLRQRIDXWKRUL]HG6&'@ security attributes.  )07B06$ 6LJQDWRU\ The TSF shall implement the >SRVWLQJ6)3VLJQDWXUHFUHDWLRQ@ in order to restrict the >6LJQDWRU\@ from >PRGLI\LQJ@ the >6&'RSHUDWLRQDO@ security attributes. )07B06$ 6DIHVHFXULW\DWWULEXWHV )07B06$ The TSF shall ensure that solely safe values are accepted for security attributes. )07B06$ 6WDWLFLQLWLDOLVDWLRQDWWULEXWH Iteration )07B06$ The TSF shall implement >SRVWLQJWKHOLVWRIDFFHVVFRQWURO6)3@ in order to provide >UHVWULFWLYH@ default values for security attributes that are used for applying the SFP.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 64 / 83 $VVLJQPHQW /LVWRI6)3DFFHVVFRQWURO - SFP access control to “IAS-eGOV” services; - SFP access control to files; - SFP access control to TLV parameters; - SFP access control to secrets; 5HILQHPHQW &UHDWLRQRIGLUHFWRULHVRUILOHV 6)3DFFHVVFRQWUROWRILOHV - The “ILOHW\SH, '$&” attributes must be provided by the domain administrator or by the issuer during creation of directories or files; - The “NH\W\SH, '$&, VHFUHWVWDWXV” attributes must be provided by the domain administrator or by the issuer when adding a key; - The “VHFXULW\FDUGVWDWXV“ attribute is constructed dynamically according to successful authentifications and established channels of trust. When switching on the Morpho-Citiz 32 card, the VHFXULW\ FDUG statusis at “none authentified“ and “no SM open.“ )07B06$ The TSF shall allow >SRVWLQJQRUROH@ to specify initial alternative values for replacing default values when an object or information are created. SSCD Iteration )07B06$ 6)3,QLWLDOL]DWLRQ The TSF shall implement >6)3LQLWLDOLVDWLRQ@and >6)3VLJQDWXUHFUHDWLRQ@ in order to provide >UHVWULFWLYH@ default values for the security attributes that are used for applying the SFP. 5HILQHPHQW The SCD “6&' RSHUDWLRQDO´ security attribute is defined at No after generation of the SCD. )07B06$ 6)3,QLWLDOL]DWLRQ The TSF shall allow >WKH$GPLQLVWUDWRU@ to specify alternative initial values for replacing default values when an object or information are created.  SSCD Iteration )07B06$ 6)36&' ,PSRUWDWLRQ The TSF shall implement >6)3,PSRUWDWLRQRI6&'@and>6)3VLJQDWXUHFUHDWLRQ@ in order to provide >UHVWULFWLYH@ default values for the security attributes that are used for applying the SFP. 5HILQHPHQW The SCD “6&'RSHUDWLRQDO“security attribute is defined at No after SCD importation. )07B06$ 6)36&' ,PSRUWDWLRQ The TSF shall allow >WKH$GPLQLVWUDWRU@ to specify initial alternative values for replacing the default values when an object or information are created.  )07B07' 0DQDJHPHQWRI76)GDWD Iteration )07B07' The TSF shall restrict the ability to >VHOHFWLRQFKDQJHDGHIDXOWYDOXHTXHVWLRQPRGLI\ GHOHWHHUDVH>SRVWLQJRWKHURSHUDWLRQV@@ the >SRVWLQJOLVWRI76)GDWD@ to >SRVWLQJ WKHDXWKRUL]HGLGHQWLILHGUROHV@. $VVLJQPHQW 0DQDJHPHQWRI76)GDWD - Modification of the PIN Code value by the issuer or by the bearer; - Modification of the cryptographic key value by the issuer or the domain authority; - Creation of a secret by the issuer or the domain authority; - Blocking or deblocking of the cryptographic key by the issuer or the domain authority;  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 65 / 83 - Deblocking a PIN Code by the issuer; - Blocking or deblocking of an application by the issuer; SSCD Iteration )07B07'  The TSF shall restrict the ability to >PRGLI\>SRVWLQJQRWDSSOLFDEOH@@ the >5$'@ to the >6LJQDWRU\@.  )07B60) 6SHFLILFDWLRQRIPDQDJHPHQWIXQFWLRQV )07B60) 7KH76)VKDOOEHFDSDEOHRILPSOHPHQWLQJWKHIROORZLQJVHFXULW\PDQDJHPHQWIXQFWLRQV >SRVWLQJ)6B*(67,21)6B6(&@ )07B605 6HFXULW\UROHV Iteration )07B605 The TSF shall keep the >SRVWLQJWKHDXWKRUL]HGLGHQWLILHGUROHV@up to date. $VVLJQPHQW $XWKRUL]HGUROHV - See Table 16 )07B605 The TSF shall be capable of associating the users to roles.  SSCD Iteration )07B605  The TSF shall keep the >$GPLQLVWUDWRU@ and >6LJQDWRU\@roles up to date. )07B605 The TSF shall be capable of associating users to roles.  Ó Â Ô ½ Á'ÕÁ Ò ½ ¸0ÃÒ ½'Ñ Ö½Ñ Á Ð( ×¿ Ã» Initialisation (Phase 4 and 5) Pre-personalizer (Administrator) After successful user authentification, this role authorizes, in a secure environment, initialisation of the Morpho-Citiz 32 card. Personalization (Phase 6) Personalizer (Administrator) After successful user authentification, this role authorizes TOE personalization, in a secure environment. This administrator may: − Create object files; − Charger and update user data and TSF; End user (Phase 7) Issuer (Administrator) After successful issuer authentification, the user may: − Block /unblock an application (ADF); − Create a secret; − Modify the status of a secret during its life cycle; − Block /unblock a secret; − Load the value of a secret; − Create and delete files / directories; End user (Phase 7) Domain authority (Administrator) After successful administrator authentification, the issuer may: − Modify the status of a secret during its life cycle; − Block /unblock a secret; − Create a secret; − Modify the status of a secret during its life cycle; − Block /unblock a secret; − Load the value of a secret; − Create and delete files / directories (domains) within an application; End user (Phase 7) Bearer (User) This role has possibilities defined by the functionalities of the Morpho-Citiz 32 card. The possibilities available to the bearer depend upon the initialisation and personalization options.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 66 / 83 7DEOH$XWKRUL]HGUROHV  )35 3URWHFWLRQRISULYDF\ )35B812 1RQREVHUYDELOLW\ Iteration )35B812 The TSF shall ensure that >SRVWLQJDOOXVHUV@ may not observe the execution of >SRVWLQJ OLVWRIRSHUDWLRQV@ on >SRVWLQJOLVWRIREMHFWV@ by >SRVWLQJOLVWRIXVHUVRUSURWHFWHG VXEMHFWV@ $VVLJQPHQW $XWKRUL]HGUROHV - See Table 17 SSCD Iteration )35B812  The TSF shall ensure that >SRVWLQJDOOXVHUV@ may not observe the execution of >SRVWLQJ OLVWRIRSHUDWLRQV@ on >SRVWLQJOLVWRIREMHFWV@ by >SRVWLQJOLVWRIXVHUVRUSURWHFWHG VXEMHFWV@ $VVLJQPHQW $XWKRUL]HGUROHV - See Table 18 Ø ×½$Ð º¿ Ã»'Ñ Ó Â Ñ¿ÃÔÃ"Ù\Ú ½ Á ¿ Ñ Ó Â Ñ¿ÃÔÏѽ$Ð Ñ;ÃÐ:Ñ:Ï3Ù\Ú ½ Á ¿ Ñ Updating OB_SECRET SUB_GS Utilization OB_SECRET SUB_CRYPTO 7DEOH3ULYDF\SURWHFWLRQ Ø ×½$Ð º¿ Ã»'Ñ Ó Â Ñ¿ÃÔÃ"Ù\Ú ½ Á ¿ Ñ Ó Â Ñ¿ÃÔÏѽ$Ð Ñ;ÃÐ:Ñ:Ï3Ù\Ú ½ Á ¿ Ñ Generation SCD/SVD Signatory, Administrator Utilization SCD Signatory Updating RAD Administrator 7DEOH66&'3ULYDF\3URWHFWLRQ  3URWHFWLRQRI72( )37 VHFXULW\IXQFWLRQV )37B$07 $EVWUDFWPDFKLQHWHVWLQJ )37B$07 The TSF shall perform a series of tests >GXULQJVWDUWXS@forproving the correct functioning of the security hypotheses provided by the abstract machine that forms the basis of the TSF. )37B(06(&72((PDQDWLRQ This requirement is an extension of part 2 of the CC >5±&&@ and originating from the PP >5±66&'7@ and >5±66&'7@. )37B(06(& The TOE shall not emit >FRYHUWFKDQQHOV@ exceeding >OLPLWVRIWKHVWDWHRIWKHDUW@ allowing access to >5$'HWWR6&'@.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 67 / 83 5HILQHPHQW The limits of the state of the art are the limits currently expected for security assessments of “smart card” products at insurance level EAL 4+.  )37B(06(& The TSF shall ensure that >DOOXVHUV@ are incapable of using the following interface >SRVWLQJH[WHUQDOLQWHUIDFH@ for gaining >5$'@ and >6&'@access. )37B)/6 )DLOXUHZLWKSUHVHUYDWLRQRIDVDIHVWDWXV )37B)/6 The TSF shall preserve a safe status when the following types of failures result:>/LVWRI GHIHFWV@  $VVLJQPHQW )DLOXUH/LVW - Unexpected interruption of the TSF execution due to extraneous events (power supply, extraction); - Faulty audit trail on memories; - Faulty audit trail on proprietary applications; - Faulty audit trail on E²PROM programmation;  Crypto library iteration. )37B)/6 The TSF shall preserve a safe status when the following error types occur : >SRVWLQJOLVW RI76)HUURUW\SHV@ $VVLJQPHQW /LVWRI76)HUURUW\SHV - Exposition to operating conditions that may be intolerable according to the TOLERANCE LIMITED TO ERRORS (FRU_FLT.2) requirement and where dysfunction may thus occur. - Attacks by DFA on the DES, the TDES and the RSA-CRT.  5HILQHPHQW The term "error" hereabove covers the "circumstances." The TOE prevents errors for the "circumstances," defined hereabove.  )37B,77 %DVLFLQWHUQDOWUDQVIHUSURWHFWLRQRI76)GDWD Crypto library iteration. )37B,77 The TSF shall protect TSF data from >VHOHFWLRQGLVFORVXUHPRGLILFDWLRQ@ when it is transmitted between separate parts of the TOE. 6HOHFWLRQ Disclosure 5HILQHPHQW The different memories, the CPU and the other TOE functional units (e.g. a cryptographic co-processor) are considered as separate parts of the TOE. FPT.ITT.1 is refined for this composite assessment in order to include resistance against secret information leaks (attacks by SPA, DPA, Timing) as well during the execution of DES, 3DES, SHA-1, RSA and RSA-CRT algorithms as during the generation of RSA keys. This requirement is equivalent to FDP_ITT.1 but concerns the TSF data instead of user data. It shall thus be understood that it refers to the same Data Processing Policy defined in FDP_IFC.1. Crypto library iteration .  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 68 / 83 The basic internal transfer protection of TSF data requires that the TSF data be protected when it is transmitted between different parts of the TOE. The TOE provides a safe copy routine that copies data blocks in such a way that this data is protected against certain attacks by covert channels. The following functional requirement is derived from the FPT_ITT.1 component of >5±&&@: )37B,77 &23< The TSF shall ensure protection of TSF data in order to prevent its >VHOHFWLRQGLVFORVXUH PRGLILFDWLRQ@ when it is transmitted between separate parts of the TOE. 6HOHFWLRQ Disclosure 5HILQHPHQW The different TOE memories are considered separate parts of the TOE. The TSF shall provide a safe copy routine that copies the data blocks in such a way that the confidentiality of this data is protected against certain attacks by covert channels. )37B3+3 3DVVLYHGHWHFWLRQRIDSK\VLFDODWWDFN )37B3+3 The TSF shall detect without ambiguity a physical intrusion that may jeopardize the TSF. )37B3+3 The TSF shall be able to determine whether a physical intrusion in the TSF devices or in the TSF elements has occurred. )37B3+3 5HVLVWDQFHWRDSK\VLFDODWWDFN )37B3+3 The TSF shall resist >SRVWLQJSK\VLFDOLQWUXVLRQVFHQDULRV@ in the >SRVWLQJ/LVWRI76) PHFKDQLVPVRUHOHPHQWV@ by automatically responding such that there be no violation of the TSP. $VVLJQPHQW 3K\VLFDOLQWUXVLRQVFHQDULRVRQWKHIROORZLQJHOHPHQWV - Reduction of the clock frequency in order to stop the TOE during a specific operation; - Raising of the clock frequency for corrupting the TOE; - Temperature modification for the purpose of corrupting TOE operations; - Modification of the current for the purpose of corrupting TOE operations; Crypto library iteration. )37B3+3 The TSF shall resist >SRVWLQJSK\VLFDOSURELQJVFHQDULRV@ on the >SRVWLQJOLVWRI76) HOHPHQWV@ by automatically responding such that there is no infringement of the TSP. $VVLJQPHQW 3K\VLFDOSURELQJVFHQDULRV Physical manipulation and physical probing. $VVLJQPHQW /LVWRI76)HOHPHQWV The TSF 5HILQHPHQW The TOE shall implement the appropriate measures for continually countering physical manipulations and the physical probing. Due to the nature of these attacks (especially manipulation), the TOE may in no way detect the attacks on all of its elements. Thus, permanent protection against these attacks is required, guaranteeing that the TSP may not be infringed at any time. Thus, an “automatic response” here means (i) it may suffer an attack at any time and (ii) countermeasures are provided at all times. )37B6(3 76)GRPDLQVHSDUDWLRQ  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 69 / 83 )37B6(3 The TSF shall maintain a security domain for its own execution that protects it from interferences and intrusions by unsafe subjects. )37B6(3 The TSF shall apply a separation between the security domains of TSC subjects. Crypto library iteration. )37B6(3 The TSF shall maintain a security domain for its own execution that protects it from interferences and intrusions by potential attackers. )37B6(3 The TSF shall apply a separation between the security domains of TSC subjects. 5HILQHPHQW The parts of the TOE that support the functional security requirements “Tolerance limited to errors” (FRU_FLT.2) and “Error with preservation of a safe status” (FPT_FLS.1) must be protected from interferences originating in the smart card embedded software. )37B7'& (OHPHQWDU\FRKHUHQFHRI76)GDWDLQWHU76) Iteration )37B7'& The TSF shall provide the capacity to interpret >SRVWLQJWKHXVHUNH\VDQGWKHEHDUHU FRGH@ in a coherent fashion when they are shared between the TSF and another trustworthy IT product. )37B7'& The TSF shall use >SRVWLQJWKH>5±($'0,1@ VSHFLILFDWLRQ@in order to interpret the TSF data of another trustworthy IT product.  SSCD Iteration )37B7'&  The TSF shall provide the capacity to interpret >SRVWLQJWKHXVHUV¶6&'69'DQGWKH 6LJQDWRU\¶VFRGH@ in a coherent fashion when they are shared between the TSF and another trustworthy IT product. )37B7'& The TSF shall use >SRVWLQJWKH>5±($'0,1@VSHFLILFDWLRQ@ in order to interpret the TSF data of another trustworthy IT product. )37B767 76)WHVWLQJ )37B767 The TSF shall execute a series of self tests >GXULQJVWDUWXS@ in order to demonstrate the proper functioning of the TSF. )37B767 The TSF shall provide authorized users the capacity to audit the integrity of TSF data.  )37B767 The TSF shall provide authorized users the capacity to audit the integrity of executable code of the TSF in memory. )37B767 3DUWLDO72(VHFXULW\WHVW )37B767 The TSF shall perform a series of tests >VHOHFWLRQGXULQJVWDUWXSSHULRGLFDOO\GXULQJ QRUPDOIXQFWLRQLQJXSRQUHTXHVWE\WKHDXWKRUL]HGXVHUDQGRUWRFRQGLWLRQV«@in order to demonstrate the proper functioning of >SRVWLQJIXQFWLRQVDQGRUPHFKDQLVPV@ 6HOHFWLRQ Upon request by the authorized user. $VVLJQPHQW )XQFWLRQVDQGRUPHFKDQLVPV RNG material.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 70 / 83  :HEDQG&KDQQHOVRI7UXVW )73  )73B,7& ,QWHU76)&KDQQHORIWUXVW SSCD Iteration )73B,7& 69'7UDQVIHU The TSF shall provide a secure communication channel between itself and a distant &*$ IT product that is logically distinct from other communication channels and that provides a sure identification of its terminations as well as protection against data modification or disclosure on the channel.   )73B,7& 69'7UDQVIHU The TSF shall allow >WKHUHPRWHSURWHFWHG,7SURGXFW@ to initiate communication by the channel of trust.  )73B,7& 69'7UDQVIHU The TSF RUWKH&*$ shall initiate communication by the channel of trust for >69' WUDQVIHU@. SSCD Iteration )73B,7& ,PSRUWDWLRQRI '7%6 The TSF shall provide a secure communication channel between itself and a distant IT product that is logically distinct from other communication channels and that provides sure identification of its terminations as well as protection against a data modification or disclosure on the channel.  )73B,7& ,PSRUWDWLRQRI '7%6 The TSF shall authorize the &*$ to initiate communication through the channel of trust.  )73B,7& ,PSRUWDWLRQRI '7%6 The TSF or the 6*$ shall initiate communication through the channel of trust for signature of the DTBS representation. SSCD Iteration )73B,7& 6&',PSRUWDWLRQ The TSF shall provide a secure communication channel between itself and a distant IT product that is logically distinct from other communication channels and that provides sure identification of its terminations as well as protection against a modification or disclosure of data on the channel.  )73B,7& 6&',PSRUWDWLRQ The TSF shall allow >WKHUHPRWHSURWHFWHG,7SURGXFW@ to initiate communication by the channel of trust.  )73B,7& 6&',PSRUWDWLRQ The TSF shall initiate communication by the channel of trust for >6&'LPSRUWDWLRQ@. 66&' 5HILQHPHQW The " secure distant IT product" mentioned is a Type 1 SSCD.  )73B753 :HERIWUXVW )73B753 72( The TSF shall provide a web of communication between itself and a local user that is logically distinct from other webs of communication and that protects the identification from its extremities as well as protecting transferred data against modification or disclosure.  )73B753 72( The TSF shall allow >ORFDOXVHUV@ to initiate communication by the web of trust.  )73B753 72( The TSF requires utilization of a web of trust for >LQLWLDOXVHUDXWKHQWLILFDWLRQ@>SRVWLQJ QRRWKHUVHUYLFHV@.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 71 / 83  5HVRXUFH8WLOL]DWLRQ)58 )58B)/7 7ROHUDQFHOLPLWHGWRHUURUV )58B)/7  The TSF shall ensure the functioning of all TOE capacities when the following errors occur: >SRVWLQJOLVWRIHUURUW\SHV@.  $VVLJQPHQW  /LVWRIHUURUW\SHV Exposition under operating conditions that are not detected according to the “Error with preservation of a safe status (FPT_FLS.1)” requirement.  5HILQHPHQW The term "error," hereabove means "circumstances." The TOE prevents errors for the "circumstances," defined hereabove.  72(6(&85,7<,1685$1&(5(48,5(0(176 The selected insurance security requirements correspond to assessment level EAL4 augmented by components ADV_IMP.2, ALC_DVS.2, AVA_MSU.3 and AVA_VLA.4. $'9B,03 76)LPSOHPHQWDWLRQ 'HYHORSHU¶VWDVNV $'9B,03' The developers shall provide a representation of the implementation of the entirety of the TSF. &RQWHQWDQGSUHVHQWDWLRQRIHOHPHQWVRISURRI $'9B,03& The representation of the implementation shall define the TSF in no uncertain terms with a sufficient level of detail so that it may be generated without supplementary design decision. $'9B,03& The representation of the implementation shall have internal coherence. $'9B,03& The representation of the implementation shall describe the relations between all SDUWVRI WKHLPSOHPHQWDWLRQ 7KHHYDOXDWRU¶VWDVNV $'9B,03( The evaluator shall confirm that the information provided satisfies all requirements relatives to content and to presentation of elements of proof. $'9B,03( The evaluator shall determine that the UHSUHVHQWDWLRQRIWKHLPSOHPHQWDWLRQis a correct instantiation and fulfils the TOE functional security requirements. 'HSHQGHQFLHV /LVWRIGHSHQGHQFLHV - ADV_LLD.1, ADV_RCR.1, ALC_TAT.1; $/&B'96 6XIILFLHQWFKDUDFWHURIVHFXULW\PHDVXUHV 'HYHORSHUV¶WDVNV $/&B'96' The developers shall produce documentation relating to development security. &RQWHQWDQGSUHVHQWDWLRQRIHOHPHQWVRISURRI $/&B'96& The documentation relating to development security shall describe all measures of physical and organizational security affecting personnel and others necessary for protecting the confidentiality, design audit trail and TOE implementation in its development environment. $/&B'96& The documentation relating to development security shall provide elements of proof indicating that these security measures are applied during TOE development and maintenance. $/&B'96& The elements of proof shall justify the security measures providing the level of protection necessary for maintaining the TOE confidentiality and audit trail. (YDOXDWRU7DVNV $/&B'96( The evaluator shall confirm that the information provided satisfies all requirements relative  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 72 / 83 to the content and to the presentation of elements of proof. $/&B'96( The evaluator shall confirm that the security measures are applied. 'HSHQGHQFLHV 1RGHSHQGHQFLHV $9$B068 $QDO\VLVDQGWHVWLQJRIXQVDIHVWDWXVHV 'HYHORSHU¶VWDVNV $9$B068' The developers shall provide information documentation. $9$B068' The developers shall document an analysis of the information documentation. &RQWHQWDQGSUHVHQWDWLRQRIHOHPHQWVRISURRI $9$B068& The information documentation shall identify all possible TOE functioning modes (including the functioning following a failure or an operational error), their consequences and implications for maintaining secure functioning. $9$B068& The information documentation shall be complete, clear, coherent and reasonable. $9$B068& The information documentation shall list all assumptions regarding the anticipated environment. $9$B068& The information documentation shall list all external security measures requirements, including the external audit procedure, physical and personal. $9$B068& The analytical documentation shall prove the completeness of the information documentation. 7KHHYDOXDWRU¶VWDVNV $9$B068( The evaluator shall confirm that the information provided satisfies all requirements relating to the content and to the presentation of elements of proof. $9$B068( The evaluator shall re-apply all configuration, installation and, selectively, other procedures, in order to confirm that the TOE may be configured and used safely by using only the guides provided. $9$B068( The evaluator shall determine whether the utilization of the guides allows for detection of all unsure statuses. $9$B068( The evaluator shall confirm that the analytical documentation demonstrates that the data for safe TOE operating advice in all operating modes is provided. $9$B068( The evaluator shall perform independent tests in order to determine whether an administrator or a user, having acquired a solid understanding of the guides, would be reasonably capable of determining if the TOE is configured and operated in an unsafe manner. 'HSHQGHQFLHV /LVWGHSHQGHQFLHV - ADV_IGS.1, ADV_FSP.1, AGD_ADM.1, AGD, USR.1; $9$B9/$ +LJKUHVLVWDQFH 'HYHORSHU¶VWDVNV $9$B9/$' The developers shall perform a vulnerability analysis. $9$B9/$' The developers shall produce the documentation relating to the vulnerability analysis. &RQWHQWDQGSUHVHQWDWLRQRIHOHPHQWVRISURRI $9$B9/$& The documentation relating to the vulnerability analysis shall describe the analysis of the TOE deliverables in order to find the routes by which the user may violate the TSP. $9$B9/$& The documentation relating to the vulnerability analysis shall describe the disposition of the vulnerabilities identified. $9$B9/$& The documentation relating to the vulnerability analysis shall demonstrate for all vulnerabilities identified that the vulnerability may not be exploited in the desired TOE environment. $9$B9/$& The documentation relating to the vulnerability analysis shall justify that, once the vulnerabilities identified, the TOE resistent to obvious penetration attacks. $9$B9/$& The documentation relating to the vulnerability analysis shall demonstrate that the search for vulnerabilities is systematic. $9$B9/$& The documentation relating to the vulnerability analysis shall provide justification that the  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 73 / 83 analysis completely takes into consideration the TOE supplies. 7KHHYDOXDWRU¶VWDVNV $9$B9/$( The evaluator shall confirm that the information provided satisfies all requirements relating to content and to the presentation of elements of proof. $9$B9/$( The evaluator shall conduct penetration tests, constructed on the developer’s vulnerability analysis, in order to guarantee that the vulnerabilities identified have been addressed. $9$B9/$( The evaluator shall perform an independent vulnerability analysis. $9$B9/$( The evaluator shall perform independent penetration tests based on the independent vulnerability analysis, in order to determine whether the additional vulnerabilities identified may be exploited in the desired environment. $9$B9/$( The evaluator shall determine that the TOE is resistant to penetration attacks performed by an attacker with a high attack potential. 'HSHQGHQFLHV /LVWRIGHSHQGHQFLHV - ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, AGD_ADM.1, AGD_USR.1;  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 74 / 83  (;7(16,212))81&7,21$/6(&85,7<5(48,5(0(176 The additional FPT_EMSEC family (emanation of the TOE) of the FPT class (TSF protection) is defined herein in order to describe the IT functional security requirements of the TOE. The TOE shall prevent attacks against the SCD and other secret data when the attack is based on the external observation of physical phenomena of the TOE. For example, such attacks correspond to the assessment of TOE electromagnetic radiation, of the simple power analysis (SPA), of the differential power analysis (DPA), of the timing of the attack, etc. This family describes the functional requirements for limiting the emanations that may be exploited. The description of this family is that presented in the PP >5±66&'7@ and >5±66&'7@. The FCS_RND family, stemming from PP >5 ± %6,@ and targets >5 ± &/67@ and >5 ± +:67@, describes the functional requirements for generating random numbers for cryptographic purposes: - FCS_RND.1 requires that the random numbers have a certain metric quality. The description of this requirement is presented in PP >5±%6,@. - FCS_RND.2 requires that the generation of random numbers be based on a given standard. This requirement is described below: )&6B51' 5DQGRPQXPEHUJHQHUDWLRQ )&6B51' The TSF shall provide a mechanism for random number generation that respects:>3RVWLQJOLVWRIVWDQGDUGV@. Subordination: To no other component. Dependencies: No dependencies. FPT_TST.2 is an additional component of the FPT_TST family of part 2 of >5±&&@. It provides the ability for testing the proper working of the special security functions or mechanisms, as well as the ability to verify the audit trail of the TSF data and executable code. This requirement is described below. )37B767 3DUWLDO72(VHFXULW\WHVW )37B767 The TSF shall perform a series of auto-tests >VHOHFWLRQGXULQJVWDUWXSSHULRGLFDOO\ GXULQJQRUPDOIXQFWLRQLQJXSRQUHTXHVWE\WKHDXWKRUL]HGXVHUDQGRUWR>SRVWLQJ FRQGLWLRQVDWZKLFKWKHDXWRWHVWVPXVWEHH[HFXWHG@in order to demonstrate the correct functioning of the >SRVWLQJIXQFWLRQVDQGRUPHFKDQLVPV@ Superior to: No other component. Dependencies : FPT_AMT.1.  ,7(19,5210(176(&85,7<5(48,5(0(176  ,7HQYLURQPHQWVHFXULW\UHTXLUHPHQWVVWHPPLQJIURP>5±&/67@ Certain requirements defined in security target >5±&/67@ pertain to the embedded software, i.e. to the TOE of the present security target. With regards to these requirements, they are covered by TOE requirements defined in § 5.2. )&6B&.0 &U\SWRJUDSKLFNH\JHQHUDWLRQ   : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 75 / 83 This requirement is covered by requirement FCS_CKM.1 au § 5.2 )&6B&.0 &U\SWRJUDSKLFNH\GLVWULEXWLRQ Not applicable in the present case. No cryptographic keys are exported from the TOE. )&6B&.0 &U\SWRJUDSKLFNH\GHVWUXFWLRQ This requirement is covered by requirement FCS_CKM.4 au § 5.2 )'3B,7& ,PSRUWLQJXVHUGDWDZLWKRXWVHFXULW\DWWULEXWHV This requirement is covered by requirement FDP_ITC.1 au § 5.2 )07B06$ 6HFXUHGVHFXULW\DWWULEXWHV This requirement is covered by requirement FMT_MSA.2 au § 5.2 )07B605 6HFXULW\UROHV This requirement is covered by requirement FMT_SMR.1 au § 5.2  ,7HQYLURQPHQWVHFXULW\UHTXLUHPHQWVVWHPPLQJIURPWKH66&'SURILOH  *HQHUDWLRQRIVLJQDWXUHNH\ 7\SH66&'  )&6B&.0 &U\SWRJUDSKLFNH\JHQHUDWLRQ )&6B&.0 The TSF shall generate cryptographic keys in compliance with the cryptographic key generation algorithm >DIIHFWDWLRQ/LVWRINH\JHQHUDWLQJDOJRULWKPV@ and to specified cryptographic key sizes >DIIHFWDWLRQ6L]HVRIDVVRFLDWHGNH\V@ that respect the >/LVWRI VWDQGDUGV@. $VVLJQPHQW 6HH7DEOH List of key generation algorithms Key sizes List of standards RSA key generation 1024 to 2048 bits AREA-K Û ¸ÜEÝÞ À ¸ß À9à ÜYá , Û ¸ÜÜŒÞ À ¸ß À9àâ á 7DEOH&U\SWRJUDSKLFNH\JHQHUDWLRQ )&6B&.0 &U\SWRJUDSKLFNH\GHVWUXFWLRQ )&6B&.0 7\SH The TSF shall destroy the cryptographic keys in compliance with a specified >SRVWLQJ D FU\SWRJUDSKLF NH\ GHVWUXFWLRQ PHWKRG@ that satisfies the following standards: >GHOHWLRQ IURPWKHPHPRU\FRQWDLQLQJWKHNH\@ )&6B&23 &U\SWRJUDSKLFRSHUDWLRQ )&6B&23 &255(63 The TSF shall execute >SRVWLQJ DXGLWLQJ RI 6&'69' FRUUHVSRQGHQFH@ in compliance with a cryptographic algorithm >SRVWLQJ 56$ NH\ FDOFXODWLRQ@ and with specified cryptographic key sizes >SRVWLQJ IURP  WR  ELWV@ that satisfy the following: >SRVWLQJ6LJQDWXUH3.&69±SDGGLQJY@. )'3B$&& 3DUWLDODFFHVVFRQWURO  )'3B$&& 6)36&' The TSF shall apply the >6)3 H[SRUWDWLRQ RI 6&'@ during >6&' H[SRUWDWLRQ E\ WKH DGPLQLVWUDWRU@.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 76 / 83 ([SRUWDWLRQ )'3B8&7 (OHPHQWDU\FRQILGHQWLDOLW\RIGDWDH[FKDQJHG )'3B8&7 ([SRUWDWLRQ The TSF shall apply the >6)3 ([SRUWDWLRQ RI 6&'@ in order to be able to >WUDQVPLW@ the objects in such a way as to protect against any unauthorized disclosure.  )73B,7& ,QWHU76)&KDQQHORIWUXVW  )73B,7& 6&'([SRUWDWLRQ The TSF shall provide a secure communication channel between itself and a distant IT product that is logically distinct from other communication channels and that provides sure identification of its terminations as well as protection against modification or disclosure of data on the channel.  )73B,7& 6&'([SRUWDWLRQ Les TSF shall allow >WKHUHPRWHSURWHFWHG,7SURGXFW@ to initiate communication by the channel of trust.  )73B,7& 6&'([SRUWDWLRQ The TSF shall initiate communication by the channel of trust for >6&'H[SRUWDWLRQ@. 66&' 5HILQHPHQW The "remote secure IT product" mentioned is a Type 2 SSCD.  &HUWLILFDWH*HQHUDWLRQ$SSOLFDWLRQ &*$  )&6B&.0 &U\SWRJUDSKLFNH\GLVWULEXWLRQ )&6B&.0 &*$ The TSF shall distribute cryptographic keys according to a cryptographic key distribution method in compliance with qualified certificates and in respect of the following rules: >SRVWLQJ>5±$5($.@>5±$5($.@@. )&6B&.0 &U\SWRJUDSKLFNH\DFFHVV )&6B&.0 &*$ The TSF shall perform >69'LPSRUWDWLRQ@ in compliance with a cryptographic key access method to >FU\SWRJUDSKLFNH\LPSRUWDWLRQWKURXJKDFKDQQHORIWUXVW@ in respect of the following rules: >DIIHFWDWLRQ>5±$5($.@>5±$5($.@@. )'3B8,7 'DWDH[FKDQJHDXGLWWUDLO )'3B8,7 69',PSRUWDWLRQ The TSF shall apply the >6)3IRU69'LPSRUWDWLRQ@in order to be able to receive user data protected against >PRGLILFDWLRQ@ and >LQVHUWLRQ@ errors.  )'3B8,7 69',PSRUWDWLRQ The TSF shall be able to determine upon reception of user data whether >PRGLILFDWLRQ@ or >LQVHUWLRQ@have occurred. )73B,7& ,QWHU76)&KDQQHORIWUXVW )73B,7&  )73B,7& 69',PSRUWDWLRQ The TSF shall provide a secure communication channel between itself and a distant IT product, logically distinct from other channels of communication and that provides sure identification of its terminations as well as protection against modification or disclosure of data on the channel.  )73B,7& The TSF shall allow >WKH76)@ to initiate communication by the channel of trust.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 77 / 83 69',PSRUWDWLRQ  )73B,7& 69',PSRUWDWLRQ The TSF RUWKH72( shall initiate communication by the channel of trust for >69' LPSRUWDWLRQ@.  6LJQDWXUH&UHDWLRQ$SSOLFDWLRQ 6&$  )&6B&23 &U\SWRJUDSKLFRSHUDWLRQ )&6B&23 +DVKRIWKH6&$ The TSF shall execute >'7%6+DVKFDOFXODWLRQ@ in compliance with a cryptographic algorithm specified at >SRVWLQJLQ>5±$5($.@>5±$5($.@DQG>5± (55$780@@ and with the sizes of the cryptographic keys that respect the following rules: >SRVWLQJ>5±$5($.@>5±$5($.@@.  )'3B8,7 'DWDH[FKDQJHDXGLWWUDLO )'3B8,7 '7%6RIWKH6&$ The TSF shall apply the >6)3VLJQDWXUHFUHDWLRQ@ in order to be able to transmit user data in such manner as to avoid >PRGLILFDWLRQ@, >GHOHWLRQ@ and >LQVHUWLRQ@errors.  )'3B8,7 '7%6RIWKH6&$ The TSF shall be able to determine upon reception whether >PRGLILFDWLRQ@, >GHOHWLRQ@ or >LQVHUWLRQ@ have occurred within user data.  )73B,7& &KDQQHORIWUXVWLQWHU76) )73B,7& '7%6RIWKH6&$ The TSF shall provide a secure communication channel between itself and a distant IT product, logically distinct from other communication channels and that provides sure identification of its terminations as well as protection against modification or disclosure of data on the channel.  )73B,7& '7%6RIWKH6&$ The TSF shall authorize >WKH76)@ to initiate the communication by the channel of trust.  )73B,7& '7%6RIWKH6&$ The TSF RUWKH72(must initiate communication by the channel of trust for >VLJQDWXUHRI WKHUHSUHVHQWDWLRQRIWKH'7%6E\WKH66&'@.  )73B753 :HERIWUXVW )73B753 6&$ The TSF shall provide a web of communication between itself and a local user logically distinct from other communication webs and that provides sure identification of its terminations as well as protection against data modification or disclosure. )73B753 6&$ The TSF shall allow >WKH76)@ to initiate the communication by the web of trust. )73B753 6&$ The TSF requires the utilization of a web of trust for >LQLWLDOXVHU DXWKHQWLILFDWLRQ@>SRVWLQJQRRWKHUVHUYLFHV@.  121,7(19,5210(176(&85,7<5(48,5(0(176  1RQ,7HQYLURQPHQWVHFXULW\5HTXLUHPHQWVVWHPPLQJIURP>5±66&'7@DQG >5±66&'7@ 5$GPLQLVWUDWRUB*XLGH  $SSOLFDWLRQRIDGPLQLVWUDWRULQIRUPDWLRQ  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 78 / 83 The implementation of the requirements of the Directive, ANNEXE II, “Requirements concerning certification service providers delivering qualified certificates," stipulates at para. (e) that the employees of CSP or of other corresponding entities shall respect the information of the administrator provided by the TOE. An audit adapted by the CSP or from other corresponding entities shall ensure the current compliance. 56LJ\B*XLGH  $SSOLFDWLRQRIXVHULQIRUPDWLRQ The implementation of the CSPP according to the requirements of the Directive, ANNEXE II “Requirements concerning the certification service providers delivering qualified certificates," stipulates at para. (k) that the signatory shall respect the TOE user information. 56LJ\B1DPH  6LJQDWRU\QDPHRQWKHTXDOLILHGFHUWLILFDWH The CSP shall verify the identity of the person to whom a qualified certificate is delivered in compliance with Directive [1], ANNEXE II “Requirements concerning the certification service providers delivering qualified certificates," para. (d). The CSP shall verify that this person holds a SSCD that implements the SCD corresponding to SVD to be included in the certificate qualified.  1RQ,7HQYLURQPHQWVHFXULW\UHTXLUHPHQWVVWHPPLQJIURP>5±&/67@ 5(3KDVH  &RQFHSWLRQDQGLPSOHPHQWDWLRQRIWKHVPDUWFDUGHPEHGGHGVRIWZDUH The developers smart card embedded software shall create and implement the smart card embedded software in such manner that the following documents requirements are satisfied: (i) the TOE data sheet material; (ii) the TOE application notes and (iii) the conclusions of the assessment reports of the relevant cryptographic library for the smart card embedded software. The developers must implement the smart card embedded software in such manner that the user data (especially the cryptographic keys) is protected, as required by the security needs of the specific context of the application. 5(&LSKHU  &RGLQJ'LDJUDPPH The smart card embedded software developers must not implement any routine in a manner that will compromise the keys when the routines are executed as part of the smart card embedded software. Executing functions that access cryptographic keys could allow an attacker to divert these functions in order to gather information on the key used during the calculation of the function. The keys must be kept secret as soon as they are generated. The keys must be unique with a very high probability as well as cryptographically strong. For example, it must be ensured that it is not possible to derive the private key of the public key if asymmetrical algorithms are used. If keys are imported into the TOE and/or derived from other keys, the quality and the confidentiality must be maintained. This implies performing appropriate environmental key management. 5(51*  5DQGRPQXPEHUVWHVWLQJ Smart card embedded software developers must call up the RNG material test routines in an apppropriate manner. These routines are implemented in the cryptographic library prior to using random numbers generated by the RNG material. The operating system shall be especially sure that, prior to utilizing random numbers generated by the RNG software, the RNG software initialisation is routine called up. This routine performs on line tests of the RNG material and uses the tested RNG material for initializing the RNG software. The random number generator software uses an internal XRAM buffer. The smart card embedded software shall insure that this buffer is read or written by the cryptographic library only during utilization of the cryptographic library, i.e., from testing of the RNG material up through the last call of whatever cryptographic library routine.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 79 / 83  72(*(1(5$/63(&,),&$7,216  &20321(17/(9(/6(&85,7<)81&7,216  )51* The random number generator produces random numbers continuously.  )+:B'(6 The TOE provides the TDES algorithm (as described in the FIPS PUB 46) thanks to a material co-processor. F.HW_DES has a high SOF. )23& The F.OPC function ensures proper TOE functioning during execution of support software dedicated to the integrated circuit and to the smart card embedded software. This includes all specific security characteristics of the TOE that are capable of providing an active response. )/2* The F.LOG function implements measures geared to limiting or eliminating information that may be contained in the form and amplitude of signals or in the intervals of time between events found while measuring such signals.  /2:/(9(/6(&85,7<)81&7,216  )6B&+(&.680 Generation of a checksum in order to ensure the audit trail integrity. FS_CHECKSUM has a high SOF.  )6B3+<6 Physical protection against the external intrusion type attacks. )6B5$1'20 Random number generation function of an octet length n. )6B&$3725 This function manages the exceptions and the indicators gathered and reported by F.OPC.  26/(9(/6(&85,7<)81&7,216  )6B&+(&. This function tests the integrity of TOE sensitive elements. )6B7(67 This function tests part of the TOE start. )6B0(02,5( This function manages deletion of the E²PROM memory.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 80 / 83 )6B,1,7 This function is called up after each reset and performs: − The TOE test by calling up the FS_TEST function; − ATR issue; − Initialisation of all software modules and applications. )6B%$&.83 This function ensures that all write operations are properly executed. )6B273 This function manages the OTP zone in E²PROM memory. )6B$&&(6 This function manages access to files, directories, proprietary data (TLV) and to keys stored en E²PROM. )6B$8',7 The function FS_AUDIT provides for reaction to an anomaly or a detected flaw.  &5<372/,%5$5</(9(/6(&85,7<)81&7,216 )/2*B&/ F.LOG_CL is a complement to the F.LOG at the software level. F.LOG_CL contains software countermeasures for attacks by covert channels. )51*B$FFHVV The TOE contains both RNG material and RNG software. F.RNG_Access consists of an RNG software implementation and appropriate RNG material on line tests. )'(6 F.DES is a cryptographic function that provides the DES algorithm as defined by the FIPS PUB 46-3 standard and supports the 2 and 3 key Triple DES algorithms according to the ANSI X9.52 standard. F.DES has a high SOF. )56$ The TOE provides functions that implement the RSA and RSA-CRT algorithms as described in Schneier, page 468 or Menezes, van Oorshot and Vanstone, section 8.2, as well as the ISO/IEC 9796 [24] Annexe A, section A.4 standard. F.RSA has a high SOF. )6+$ The TOE implements functions for calculating the SHA-1 algorithm according to the FIPS 180-1 standard. F.SHA-1 has a high SOF. )56$B.H\*HQ The TSF F.RSA_KeyGen provides the functionality for generating pairs of RSA public keys as described in Regulierungsbehörde für Telekommunikation und Post: Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und der Signaturverordnung (Übersicht über geeignete Algorithmen), German “Bundesanzeiger Nr. 30”, p.2537-2538, February 13th, 2004. F.RSA_KeyGen has a high SOF. )2EMHFWB5HXVH The TOE provides internal security measures that delete memory zones used by the cryptographic library after usage.  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 81 / 83 )&23< F.COPY implements the memory content copy functionality by using a routine that includes countermeasures against attacks by covert channels.  $33/,&$7,210$1$*(5/(9(/6(&85,7<)81&7,216 )6B0$1$*(0(17 Upon starting the card, this function calls up FS_INIT and then waits for a terminal command. This command is either processed or redirected towards another element. In particular, the function manages: − selection of an application; − the status of the security card; − security function applications.  $33/,&$7,9(/(9(/6(&85,7<)81&7,216 )6B$87+ This function manages the authentifications of different TOE users on the basis of secrets authentification associated with different users (call to FS_CRYPTO). FS_AUTH has a high SOF. )6B5$7,) This function manages the ratification counters associated with a secret. )6B&5<372 This function ensures high level cryptographic operations: − Data Encryption/Decryption; − Production/verification of authentification cryptogrammes; − Audit trail inspection of cryptographic keys and data; − Generation of secure electronic signature on external data; − Calculation of hash value; − PIN Code Verification. FS_CRYPTO calls up F.DES, F.RSA and F.SHA-1 for performing these cryptographic operations. FS_CRYPTO has a High SOF. )6B6(& This function allows for ensuring secrets management. Secrets management includes the following functions: − Electronic signature bi-key generation; − Session key generation; − Key destruction; − Secret modification; − Secret transfer; − Secret unlocking. FS_SEC calls up F.COPY for manipulating secrets and F.RSA_KeyGen for generating RSA bi-keys in RSA-CRT format. FS_SEC has a High SOF. )6B&200$1' When the manager receives a command, he dispatches it to a processing application. The FS_COMMAND function implemented in the applications then performs the following: − Command validity test; − Tests concerning the command semantics;  : &RXUWHV\WUDQVODWLRQ Sagem Défense Sécurité Document. SK-0000053756 82 / 83  &RXUWHV\WUDQVODWLRQ Document Sagem Defense Security. SK-0000053756 83 / 83  33&203/,$1&(127,&(  335()(5(1&( The present security target complies with protection profiles >5±66&'7@ and >5±66&'7@. The distribution between these two protection profiles for the assumptions, threats, TOE Security Objectives and its environment as well as for TOE functional security requirements are presented in the following tables: − Table 5: ST/PP Correspondences – assumptions for the TOE; − Table 6: ST/PP Correspondences – threats for the TOE; − Table 10: ST/PP Correspondence – TOE Security Objectives ; − Table 11: ST/PP Correspondence – Security Objectives for the TOE environment ; − Table 12: ST/PP Correspondence–TOE security .  33$'',7,216 In the present security target, the additions to the following security requirements have been made to the security requirements of protection profiles >5±@, >5±66&'7@ and >5±66&'7@ and of the target >5±&/67@ already present in the present security target: − FMT_SMF: Specification of management functions The additions to the security requirements are presented in “LWDOLFV” in the following chapters and tables: − Chapter 5.2.5: FMT Security − Table 12: ST/PP Correspondence–TOE security . (1'2)'2&80(17