prEN 419111-5
(Main)Protection profiles for signature creation and verification application - Signature verification application - Part 5: Possible extensions
Protection profiles for signature creation and verification application - Signature verification application - Part 5: Possible extensions
This document contains a set of packages. These packages describe security functions that may be added to the core SVA PP prEN 419111-4:2013. The following packages are available:
- Checker package
- Certificate management package
- Explicit SP management package
Schutzprofile für eine Anwendung zum Erzeugen und Prüfen von Signaturen - Signatur Verifikation Anwendung - Teil 5: Mögliche Extentionen
Profils de protection pour application de création et de vérification de signature - Application de vérification de signature - Partie 5: Extensions possibles
Le présent document contient un groupe d'ensembles. Ces ensembles décrivent les fonctions de sécurité qui peuvent être ajoutées au profil de protection (ou PP pour Protection Profile) de base de l'application de vérification de signature (ou SVA pour Signature Verification Application) : prEN 419111-4:2013 [4]. Les ensembles suivants sont disponibles :
- ensemble contrôleur ;
- ensemble gestion de certificat ;
- ensemble gestion de politique de signature (ou SP pour Signature policy) explicite.
Zaščitni profili za uporabo pri oblikovanju in preverjanju podpisov - Aplikacija preverjanja podpisa - 5. del: Mogoče razširitve
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
01-april-2013
=DãþLWQLSURILOL]DXSRUDERSULREOLNRYDQMXLQSUHYHUMDQMXSRGSLVRY$SOLNDFLMD
SUHYHUMDQMDSRGSLVDGHO0RJRþHUD]ãLULWYH
Protection profiles for signature creation and verification application - Signature
verification application - Part 5: Possible extensions
Schutzprofile für eine Anwendung zum Erzeugen und Prüfen von Signaturen - Signatur
Verifikation Anwendung - Teil 5: Mögliche Extentionen
Profils de protection pour application de création et de vérification de signature -
Application de vérification de signature - Partie 5: Extensions possibles
Ta slovenski standard je istoveten z: prEN 419111-5
ICS:
35.240.15 Identifikacijske kartice in Identification cards and
sorodne naprave related devices
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD
DRAFT
NORME EUROPÉENNE
EUROPÄISCHE NORM
February 2013
ICS 35.240.15 Will supersede CWA 14171:2004
English Version
Protection profiles for signature creation and verification
application - Signature verification application - Part 5: Possible
extensions
Profils de protection pour application de création et de Schutzprofile für eine Anwendung zum Erzeugen und
vérification de signature - Application de vérification de Prüfen von Signaturen - Signatur Verifikation Anwendung -
signature - Partie 5: Extensions possibles Teil 5: Mögliche Extentionen
This draft European Standard is submitted to CEN members for enquiry. It has been drawn up by the Technical Committee CEN/TC 224.
If this draft becomes a European Standard, CEN members are bound to comply with the CEN/CENELEC Internal Regulations which
stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
This draft European Standard was established by CEN in three official versions (English, French, German). A version in any other language
made by translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management
Centre has the same status as the official versions.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.
Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of which they are aware and to
provide supporting documentation.
Warning : This document is not a European Standard. It is distributed for review and comments. It is subject to change without notice and
shall not be referred to as a European Standard.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2013 CEN All rights of exploitation in any form and by any means reserved Ref. No. prEN 419111-5:2013: E
worldwide for CEN national Members.
prEN 416111-5:2013 (E)
Contents Page
Foreword .5
1 Scope .6
2 Normative references .6
3 Terms and definitions .6
4 Symbols and abbreviations .6
5 Extended component definition .6
5.1 Definition of the Family FDP_SVR .6
6 Checker package .8
6.1 Scope .8
6.1.1 Introduction .8
6.2 Conformance .8
6.2.1 CC Conformance Claim .8
6.2.2 EAL Claim .8
6.3 Security problem definition .8
6.3.1 Assets .8
6.3.2 Threats .8
6.3.3 Organisational security policies .9
6.3.4 Assumptions .9
6.4 Security objectives .9
6.4.1 Security objectives for the TOE .9
6.4.2 Security objectives for the operational environment.9
6.4.3 Rationale for Security objectives .9
6.5 Security requirements .9
6.5.1 Introduction .9
6.5.2 Security functional requirements.9
6.5.3 SFR / Security objectives . 11
6.5.4 SFR Dependencies . 12
7 Time stamp attribute package . 14
7.1 Scope . 14
7.1.1 Introduction . 14
7.1.2 TS attribute computation . 14
7.1.3 TS attribute verification . 14
7.2 Conformance . 15
7.2.1 CC Conformance Claim . 15
7.2.2 EAL Claim . 15
7.3 Security problem definition . 15
7.3.1 Assets . 15
7.3.2 Threats . 15
7.3.3 Organisational security policies . 15
7.3.4 Assumptions . 15
7.4 Security objectives . 15
7.4.1 Security objectives for the TOE . 15
7.4.2 Security objectives for the operational environment. 15
7.4.3 Rationale for Security objectives . 15
7.5 Security requirements . 16
7.5.1 Introduction . 16
7.5.2 Security functional requirements. 16
7.5.3 SFR / Security objectives . 18
prEN 416111-5:2013 (E)
7.5.4 SFR Dependencies . 18
8 Complete validation data attribute package . 18
8.1 Scope . 18
8.1.1 Introduction . 18
8.1.2 Complete validation attribute computation . 19
8.1.3 Complete validation attribute verification . 19
8.2 Conformance . 19
8.2.1 CC Conformance Claim . 19
8.2.2 EAL Claim . 19
8.3 Security problem definition . 19
8.3.1 Assets . 19
8.3.2 Threats . 20
8.3.3 Organisational security policies . 20
8.3.4 Assumptions . 20
8.4 Security objectives . 20
8.4.1 Security objectives for the TOE . 20
8.4.2 Security objectives for the operational environment . 20
8.4.3 Rationale for Security objectives . 20
8.5 Security requirements . 20
8.5.1 Introduction . 20
8.5.2 Security functional requirements . 21
8.5.3 SFR / Security objectives. 23
8.5.4 SFR Dependencies . 23
9 Explicit Policy-based ES package . 23
9.1 Scope . 23
9.1.1 Introduction .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.