PREMIER MINISTRE Secretariat General for National Defence Central Directorate for Information Systems Security Certification Report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Paris, 15 January 2007 Courtesy Translation Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 2 out 16 CER/F/07.5 Warning This report is designed to provide sponsors with a document enabling them to assess the security level of a product under the conditions of use and operation defined in this report for the evaluated version. It is also designed to provide the potential purchaser of the product with the conditions under which he may operate or use the product so as to meet the conditions of use for which the product has been evaluated and certified; that is why this certification report must be read alongside the evaluated user and administration guidance, as well as with the product security target, which presents threats, environmental assumptions and the supposed conditions of use so that the user can judge for himself whether the product meets his needs in terms of security objectives. Certification does not, however, constitute a recommendation product from DCSSI (Central Directorate for Information Systems Security), and does not guarantee that the certified product is totally free of all exploitable vulnerabilities. Any correspondence about this report has to be addressed to: Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d'Information Centre de certification 51, boulevard de la Tour Maubourg 75700 PARIS cedex 07 SP France certification.dcssi@sgdn.pm.gouv.fr Reproduction of this document without any change or cut is authorised. ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 3 out 16 Certification report reference 2007/01 Product name ATMEL Secure Microcontroller AT90SC6408RFT rev. E Product reference AT90SC6408RFT, reference AT58848 revision E Protection profile conformity PP/9806 Evaluation criteria and version Common Criteria version 2.3 compliant with ISO 15408:2005 Evaluation level EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4 Developer(s) Atmel SmartCard ICs Maxwell Building - Scottish Enterprise technology Park, East Kilbride, Glasgow G75 0QR, Scotland Sponsor Atmel SmartCard ICs Maxwell Building - Scottish Enterprise technology Park, East Kilbride, Glasgow G75 0QR, Scotland Evaluation facility CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 40 87, email : cesti.leti@cea.fr Recognition arrangements CCRA The product is recognised at EAL4 level. SOG-IS Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 4 out 16 CER/F/07.5 Introduction The Certification Security certification for information technology products and systems is governed by decree number 2002-535 dated April, 18th 2002, and published in the "Journal Officiel de la République Française". This decree stipulates that: • The central information system security department draws up certification reports. These reports indicate the features of the proposed security targets. They may include any warnings that the authors feel the need to mention for security reasons. They may or may not be transmitted to third parties or made public, as the principals desire (article 7). • The certificates issued by the Prime Minister certify that the copies of the products or systems submitted for evaluation fulfil the specified security features. They also certify that the evaluations have been carried out in compliance with applicable rules and standards, with the required degrees of skill and impartiality (article 8). The procedures are available on the Internet site www.ssi.gouv.fr. ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 5 out 16 Content 1. THE PRODUCT........................................................................................................................... 6 1.1. PRESENTATION OF THE PRODUCT........................................................................................... 6 1.2. EVALUATED PRODUCT DESCRIPTION ..................................................................................... 6 1.2.1. Product identification.................................................................................................... 6 1.2.2. Security services............................................................................................................ 6 1.2.3. Architecture................................................................................................................... 7 1.2.4. Life cycle ....................................................................................................................... 8 1.2.5. Evaluated configuration................................................................................................ 9 2. THE EVALUATION.................................................................................................................. 10 2.1. EVALUATION REFERENTIAL ................................................................................................. 10 2.2. EVALUATION WORK ............................................................................................................. 10 2.3. CRYPTOGRAPHIC MECHANISMS ROBUSTNESS ANALYSIS..................................................... 10 3. CERTIFICATION...................................................................................................................... 11 3.1. CONCLUSION........................................................................................................................ 11 3.2. RESTRICTIONS...................................................................................................................... 11 3.3. RECOGNITION OF THE CERTIFICATE..................................................................................... 11 3.3.1. European recognition (SOG-IS).................................................................................. 11 3.3.2. International common criteria recognition (CCRA)................................................... 12 ANNEX 1. EVALUATION LEVEL OF THE PRODUCT.......................................................... 13 ANNEX 2. EVALUATED PRODUCT REFERENCES .............................................................. 14 ANNEX 3. CERTIFICATION REFERENCES ........................................................................... 16 Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 6 out 16 CER/F/07.5 1. The product 1.1. Presentation of the product The evaluated product is the secure microcontroller AT90SC6408RFT, reference AT58848 revision E developed by Atmel SmartCard ICs. The microcontroller aims to host one or several software applications and can be embedded in a plastic support to create a Smartcard with multiple possible usages (identity documents, banking, health card, pay-TV or transport applications…) depending on the Embedded Software applications. However, only the microcontroller is evaluated. The software applications are not in the scope of this evaluation. 1.2. Evaluated product description The security target [ST] defines the evaluated product, its evaluated security functionalities and its operation environment. This security target is compliant to [PP9806] protection profile. 1.2.1. Product identification The configuration list [CONF] identifies the product’s constituent elements. The certified version of the product can be identified by the following elements: - Product name: AT90SC6408RFT, and product identification number: AT58848. This information can be checked using Serial number register SN_0, which content should be hexadecimal 0x26 (see [GUIDES], “AT90SC6408RFT Datasheet” section 21.1.1.). - Silicon revision: E. Contrary to the specifications described in the technical datasheet, this information cannot be checked using Serial number register SN_1, which was not properly updated. So ATMEL proposed the following process: Customers will contact ATMEL with batch number information (Registers SN_2 to SN_8). ATMEL reply with required identification information (silicon revision). - The TOE can be physically identified by the mask numbers visible on the metal layer, and listed in the “Twister Pattern Mask List” document (cf. [CONF]). 1.2.2. Security services The product provides mainly the following security services: - Test Mode Entry, - Protected Test Memory Access, - Test Mode Disable, - TOE Testing, - Data Error Detection, - FireWall, - Event Audit, - Event Action, - Unobservability, ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 7 out 16 - Cryptography, - Package mode entry, - Test Memory Access in Package Mode. 1.2.3. Architecture The AT90SC6408RFT microcontroller is made up of: - AVR Risk processing unit, - 64Kb of program ROM memory, - 8Kb of EEPROM program/data memory including 64 bytes of One Time Programmable (OTP) memory and a 192-byte of bit-addressable area, - 1Kb of static RAM memory, - a 32bit Checksum Accelerator, - a CRC-16/32 peripheral, - a Random Number Generator, - a fast hardware DES/3DES peripheral, - detectors which monitor voltage, frequency and temperature, - a firewall that protects all memories, peripheral and IO register accesses, - a power management system (the microcontroller works under a voltage range from 3V to 5V), - logic peripherals including 3 timers, 1 serial port, an ISO7816 interface and an ISO7816 controller, a contactless interface with full support for ISO/IEC 14443 type A and B, - a dedicated test structure that can be used only in test mode for production testing, and sawn before IC packaging. Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 8 out 16 CER/F/07.5 1.2.4. Life cycle The product’s life cycle is organised as follow: Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Smartcard embedded software development Product construction IC design with its dedicated software Smartcard IC database construction IC photomask fabrication IC testing and prepersonalisation IC manufacturing Testing IC packaging Testing Smartcard product finishing process Testing Personalisation Smartcard product end- usage Poduct usage End of life process Légende Trusted delivery and verification procedures Delivery done within secure environment Phases supposed to be secured ATMEL EKB ATMEL RFO Compugraphics ATMEL NTS ATMEL EKB Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Smartcard embedded software development Product construction IC design with its dedicated software Smartcard IC database construction IC photomask fabrication IC testing and prepersonalisation IC manufacturing Testing IC packaging Testing Smartcard product finishing process Testing Personalisation Smartcard product end- usage Poduct usage End of life process Légende Trusted delivery and verification procedures Delivery done within secure environment Légende Trusted delivery and verification procedures Delivery done within secure environment Phases supposed to be secured ATMEL EKB ATMEL RFO Compugraphics ATMEL NTS ATMEL EKB Figure 1 – standard IC life-cycle The different sites impacted by the evaluation are listed bellow. The product is designed and tested by: Atmel East Kilbride Maxwell Building Scottish Enterprise technology Park East Kilbride Glasgow G75 0QR, Scotland. ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 9 out 16 The database of the product is prepared by: Atmel Rousset Z.I. Rousset Peynier 13106 Rousset Cedex France. The photo masks of the product are manufactured by: Compugraphics International Ltd Newark Road North Eastfield industrial Estate Glenrothes Fife, KY7 4NT Scotland. The product is manufactured by: Atmel North Tyneside Middle Engine Lane Silverlink business Park North Tyneside, NE28 9N2 England. The product can be in one of its three possible modes: - “Test” mode: mode in which the microcontroller runs under the control of dedicated test software written to EEPROM via a test interface, and in conjunction with stimulus provided by an external test system. This mode is intended to be used solely by authorized development staff. - “User” mode: mode, in which the microcontroller runs under control of the smartcard embedded software. It is intended that customers and end-users will always use the MCU in user mode. - “Package” mode: this mode is similar to Test Mode for testing returns from Phases 4- 7. Package mode runs a limited subset of test commands via a test interface, and in conjunction with stimulus provided by an external test system. This mode is intended to be used solely by authorized staff. 1.2.5. Evaluated configuration This certification report applies to the microcontroller only. Any other software used for the evaluation are not part of the scope of certification. With regard to the life-cycle, the evaluated product is the one at the end of its manufacturing phase (phase 3). For the evaluation needs, the product was provided in to the ITSEF in a mode known as “open1 ”. 1 mode that enables to load and execute a native code in EEPROM and also to disable the configurable security mechanisms Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 10 out 16 CER/F/07.5 2. The evaluation 2.1. Evaluation referential The evaluation has been performed in compliance with Common Criteria version 2.3 [CC] and with the Common Evaluation Methodology [CEM]. For assurance components above EAL4 level, the evaluation facility own evaluation methods consistent with [AIS34], validated by DCSSI have been used. In order to meet the specificities of smart cards, the [CCIC] and [CCAP] guides have been applied. 2.2. Evaluation work The evaluation relies on the evaluation results of the ATMEL secure microcontroller AT90SC320288RCT / AT90SC144144CT rev. G certified the 16 November 2006 under the reference 2006/20 (cf. [2006/20]). The evaluation technical report [RTE], delivered to DCSSI the 22 December 2006, provides details on the work performed by the evaluation facility and assesses that all evaluation tasks are “pass”. 2.3. Cryptographic mechanisms robustness analysis The robustness of cryptographic mechanisms has not been analysed by DCSSI. ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 11 out 16 3. Certification 3.1. Conclusion The evaluation identified in chapter 2 and described in the evaluation technical report [ETR], was carried out according to the current rules and standards, with the required competency and impartiality by a licensed evaluation facility. All the work performed permits the release of a certificate in conformance with the decree 2002-535. This certificate testifies that the product “AT90SC6408RFT, reference AT58848 revision E” submitted for evaluation fulfils the security features specified in its security target [ST] for the evaluation level EAL4 augmented. 3.2. Restrictions This certificate only applies on the product specified in chapter 1.2 of this certification report. This certificate provides a resistance assessment of the AT90SC6408RFT product to a set of attacks, which remains generic due to the missing of any specific embedded application. Therefore, the security of a final product based on the evaluated microcontroller would only be assessed through the final product evaluation, which could be performed on the basis of the current evaluation results. The user of the certified product shall respect the operational environmental security objectives summarized specified in the security target [ST] and shall respect the recommendations in the guidance [GUIDES], in particular: - Secure communication protocols and procedures shall be used between smartcard and terminal. - The integrity and the confidentiality of sensitive data stored or handled by the system (terminals, communications....) shall be maintained. 3.3. Recognition of the certificate 3.3.1. European recognition (SOG-IS) This certificate is released in accordance with the provisions of the SOG-IS agreement [SOG- IS]. The European Recognition Agreement made by SOG-IS in 1999 allows recognition from Signatory States of the agreement1 , of ITSEC and Common Criteria certificates. The 1 The signatory countries of the SOG-IS agreement are: Finland, France, Germany, Italy, The Netherlands, Norway, Portugal, Spain, Sweden, Switzerland and United Kingdom. Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 12 out 16 CER/F/07.5 European recognition is applicable up to ITSEC E6 and CC EAL7 levels. The certificates that are recognized in the agreement scope are released with the following marking: 3.3.2. International common criteria recognition (CCRA) This certificate is released in accordance with the provisions of the CCRA [CC RA]. The Common Criteria Recognition Arrangement allows the recognition, by signatory countries1 , of the Common Criteria certificates. The mutual recognition is applicable up to the assurance components of CC EAL4 level and also to ALC_FLR family. The certificates that are recognized in the agreement scope are released with the following marking: 1 The signatory countries of the CCRA arrangement are: Australia, Austria, Canada, Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, India, Israel, Italy, Japan, The Netherlands, New-Zealand, Norway, Singapore, Spain, Sweden, Turkey, United Kingdom and United States. ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 13 out 16 Annex 1. Evaluation level of the product Components by assurance level Assurance level of the product Class Family EAL 1 EAL 2 EAL 3 EAL 4 EAL 5 EAL 6 EAL 7 EAL 4+ Name of the component ACM_AUT 1 1 2 2 1 Partial CM automation ACM_CAP 1 2 3 4 4 5 5 4 Configuration support and acceptance procedures ACM Configuration management ACM_SCP 1 2 3 3 3 2 Problem tracking CM coverage ADO_DEL 1 1 2 2 2 3 2 Detection of modification ADO Delivery and operation ADO_IGS 1 1 1 1 1 1 1 1 Installation, generation and start-up procedures ADV_FSP 1 1 1 2 3 3 4 2 Fully defined external interfaces ADV_HLD 1 2 2 3 4 5 2 Security enforcing high-level design ADV_IMP 1 2 3 3 2 Implementation of the TSF ADV_INT 1 2 3 ADV_LLD 1 1 2 2 1 Descriptive low-level design ADV_RCR 1 1 1 1 2 2 3 1 Informal correspondence demonstration ADV Development ADV_SPM 1 3 3 3 1 Informal TOE security policy model AGD_ADM 1 1 1 1 1 1 1 1 Administrator guidance AGD Guidance AGD_USR 1 1 1 1 1 1 1 1 User guidance ALC_DVS 1 1 1 2 2 2 Sufficiency of security measures ALC_FLR ALC_LCD 1 2 2 3 1 Developer defined life-cycle model ALC Life-cycle support ALC_TAT 1 2 3 3 1 Well-defined development tools ATE_COV 1 2 2 2 3 3 2 Analysis of coverage ATE_DPT 1 1 2 2 3 1 Testing: high-level design ATE_FUN 1 1 1 1 2 2 1 Functional testing ATE Tests ATE_IND 1 2 2 2 2 2 3 2 Independent testing – sample AVA_CCA 1 2 2 AVA_MSU 1 2 2 3 3 3 Analysis and testing of insecure states AVA_SOF 1 1 1 1 1 1 1 Strength of TOE security function evaluation AVA Vulnerability assessment AVA_VLA 1 1 2 3 4 4 4 Highly resistant Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 14 out 16 CER/F/07.5 Annex 2. Evaluated product references [2006/20] Certification Report 2006/20 - ATMEL secure microcontroller AT90SC320288RCT/AT90SC144144CT rev. G, 8 Decembre 2005, SGDN/DCSSI. [ST] Reference security target for the evaluation: - Twister Security Target, Reference: Twister_ST_V1.3_12Dec06 ATMEL Smart Card ICs For the needs of publication, the following security target has been provided and validated in the evaluation: - AT90SC6408RFT Security Target Lite, Reference: TPG0141A_15Dec06 ATMEL Smart Card ICs [RTE] Evaluation technical report : - TWISTER Project - Evaluation Technical Report, Reference: LETI.CESTI.TWI.RTE.001 version 1.1 CESTI LETI For the needs of composite evaluation with this microcontroller a technical report for composition has been validated: - TWISTER Project - Evaluation Technical Report Lite, Reference: LETI.CESTI.TWI.RTE.002 version 1.2 CESTI LETI [CONF] The configuration list is: - Twister Design Configuration List, Reference: Twister_DCL_V1.1 ATMEL Smart Card ICs - Twister Manufacturing Configuration List, Reference: Twister_MCL_V1.1 ATMEL Smart Card ICs - Twister Pattern Mask List, Reference: Twister_PML_V1.1 ATMEL Smart Card Ics - Twister deliverables list, Reference: Twister Rev E _ EDL_15Dec06 ATMEL Smart Card ICs [GUIDES] Guidance of the product: - AT90SC CC AGD Interface, Reference: AT90SC_GUID_V1.4_05Jul05 ATMEL Smart Card ICs - AT90SC6408RFT Datasheet, Reference: TPR0184AX_12Apr06 ATMEL Smart Card Ics ATMEL Secure Microcontroller AT90SC6408RFT rev. E Certification report 2007/01 Page 15 out 16 - AT90SC Addressing Modes and Instruction Set, Reference: 1323C-03May04 ATMEL Smart Card ICs - Security Recommendations for AT90SC ASL4 Products, Reference: TPR0066G-05Jul05 ATMEL Smart Card ICs - Secured Hardware DES/TDES on AT90SC ASL4 Products, Reference: TPR0063FX-29Sep06 ATMEL Smart Card ICs - Generating unpredictable random numbers on the AT90SC family devices, Reference: 1573CX_SMIC_21mar03 ATMEL Smart Card ICs - Using the supervisor and user modes on the AT90SC ASL4 products, Reference: TPR0095A-11Mar03 ATMEL Smart Card ICs - Checksum Accelerator use on the AT90SC ASL4 products, Reference: TPR0065A-02Jul02 ATMEL Smart Card Ics - Wafer Saw Recommendations, Reference: : TPG0079A_13Jun05 ATMEL Smart Card ICs [PP/9806] Protection Profile Smart Card Integrated Circuit Version 2.0, September 1998. Certified under the reference PP/9806. Certification report 2007/01 ATMEL Secure Microcontroller AT90SC6408RFT rev. E Page 16 out 16 CER/F/07.5 Annex 3. Certification references Decree number 2002-535 dated 18th April 2002 related to the security evaluations and certifications for information technology products and systems. [CER/P/01] Procedure CER/P/01 - Certification of the security provided by IT products and systems, DCSSI. [CC] Common Criteria for Information Technology Security Evaluation: Part 1: Introduction and general model, August 2005, version 2.3, ref CCMB-2005-08-001; Part 2: Security functional requirements, August 2005, version 2.3, ref CCMB-2005-08-002; Part 3: Security assurance requirements, August 2005, version 2.3, ref CCMB-2005-08-003. The content of Common Criteria version 2.3 is identical to the international ISO/IEC 15408:2005. [CEM] Common Methodology for Information Technology Security Evaluation: Evaluation Methodology, August 2005, version 2.3, ref CCMB-2005-08-004. The content of CEM version 2.3 is identical to the international ISO/IEC 18045:2005. [CC IC] Common Criteria Supporting Document - Mandatory Technical Document - The Application of CC to Integrated Circuits, version 2.0, April 2006. [CC AP] Common Criteria Supporting Document - Mandatory Technical Document - Application of attack potential to smart-cards, version 2.1, April 2006. [CC RA] Arrangement on the Recognition of Common criteria certificates in the field of information Technology Security, May 2000. [SOG-IS] «Mutual Recognition Agreement of Information Technology Security Evaluation Certificates», version 2.0, April 1999, Management Committee of Agreement Group. [AIS 34] Application Notes and Interpretation of the Scheme - Evaluation Methodology for CC Assurance Classes for EAL5+, AIS34, Version 1.00, 01 June 2004