CEN/TS 419221-1:2016
(Main)Protection Profiles for TSP cryptographic modules - Part 1: Overview
Protection Profiles for TSP cryptographic modules - Part 1: Overview
This Technical Specification provides an overview of the protection profiles specified in other parts of CEN/TS 419221.
Schutzprofile für kryptographische Module von vertrauenswürdigen Dienstanbietern - Teil 1: Überblick
Profils de protection pour modules cryptographiques utilisés par les prestataires de services de confiance - Partie 1: Vue d’ensemble
Zaščitni profili za kriptografske module TSP - 1. del: Pregled
Ta tehnična specifikacija podaja pregled zaščitnih profilov, ki so določeni v drugih delih standarda FprCEN/TS 419221.
General Information
Overview
The CEN/TS 419221-1:2016 is a Technical Specification developed by CEN that provides a comprehensive overview of protection profiles for cryptographic modules used by Trust Service Providers (TSPs). This standard outlines the framework according to which cryptographic modules designed for secure signing, key generation, and other trust-related cryptographic services are evaluated, based on the principles of the Common Criteria (ISO/IEC 15408 series).
Designed for secure electronic signature creation by Certification Service Providers (CSPs), this specification addresses the requirements established in Directive 1999/93/EC and Regulation (EU) No 910/2014 (eIDAS). It defines key terminologies and concepts necessary for implementing, assessing, and using cryptographic modules in trust services, emphasizing secure and trustworthy digital transaction environments.
Key Topics
Protection Profiles for Cryptographic Modules: CEN/TS 419221-1 introduces the series of protection profiles for cryptographic modules used in TSP environments. These profiles ensure interoperability and compliance with European digital signature regulations.
Common Criteria Framework: The standard applies the ISO/IEC 15408 Common Criteria methodology to specify security functions and assurance requirements for cryptographic modules, facilitating consistent evaluation and certification.
Scope of Protection Profiles: The document categorizes cryptographic modules according to specific functions:
- Signing operations with secure key backup.
- Key generation services within CSP systems.
- Signing operations without backup.
- Trust service provider cryptographic modules covering signing and authentication.
Important Definitions: The document provides detailed definitions relevant to trust services, such as advanced electronic signatures, certification-service-provider (CSP), signature-creation data (SCD), subscriber Secure Signature-Creation Device (SSCD), and secure backup and restore mechanisms.
Roles and Concepts: It highlights roles like administrators, auditors, users, and the cryptographic module as the Target of Evaluation (TOE), ensuring clarity for implementers and evaluators.
Applications
Digital Signature Services: CSPs use cryptographic modules adhering to these protection profiles to create advanced electronic signatures that meet legal and regulatory requirements, enhancing trust in electronic transactions.
Key Management for TSPs: The profiles guide secure key generation, storage, backup, and restoration operations vital for maintaining the integrity and confidentiality of cryptographic keys in trust service infrastructures.
Certification Authority (CA) Operations: The standard supports CAs operating at the root or subordinate levels, especially where modules face high risks of physical tampering or cyber-attacks, by specifying secure cryptographic module requirements.
Regulatory Compliance: Implementers of signing and authentication devices aligned with this standard ensure interoperability, legal compliance under EU regulations, and proper evaluation for security certification.
Related Standards
ISO/IEC 15408 Series (Common Criteria): Provides the international framework for specifying, implementing, and evaluating IT security products, forming the basis for this specification’s protection profiles.
Directive 1999/93/EC on Electronic Signatures: European legislation defining advanced electronic signature requirements, serving as a foundation for the cryptographic module protections outlined.
Regulation (EU) No 910/2014 (eIDAS Regulation): Establishes legal frameworks for trust services including electronic identification and signature, dictating requirements for CSP cryptographic modules.
ETSI/TS 119 312: Provides recommendations on approved cryptographic algorithms and parameters for secure electronic signatures that complement the technical requirements.
CEN/TS 419241: Addresses security requirements for trustworthy systems supporting server signing, relevant for broader trust service environments involving CSP operations.
By following the CEN/TS 419221-1:2016 overview, stakeholders in trust service provisioning-including CSPs, developers of secure signature devices, and certification bodies-can align cryptographic module design and evaluation with stringent security criteria. This ensures robust protection of sensitive cryptographic keys and fosters confidence in electronic transaction security across Europe.
Standards Content (Sample)
SLOVENSKI STANDARD
01-januar-2017
=DãþLWQLSURILOL]DNULSWRJUDIVNHPRGXOH763GHO3UHJOHG
Protection Profiles for TSP cryptographic modules - Part 1: Overview
Schutzprofile für kryptographische Module von vertrauenswürdigen Dienstanbietern - Teil
1: Überblick
Profils de protection pour modules cryptographiques utilisés par les prestataires de
services
Ta slovenski standard je istoveten z: CEN/TS 419221-1:2016
ICS:
35.040.01 Kodiranje informacij na Information coding in general
splošno
35.100.05 9HþVORMQHXSRUDEQLãNH Multilayer applications
UHãLWYH
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
CEN/TS 419221-1
TECHNICAL SPECIFICATION
SPÉCIFICATION TECHNIQUE
July 2016
TECHNISCHE SPEZIFIKATION
ICS 35.040; 35.240.30 Supersedes CWA 14167-1:2003
English Version
Protection Profiles for TSP cryptographic modules - Part 1:
Overview
Profils de protection pour modules cryptographiques Schutzprofile für kryptographische Module von
utilisés par les prestataires de services de confiance - vertrauenswürdigen Dienstanbietern - Teil 1:
Partie 1 : Vue d'ensemble Überblick
This Technical Specification (CEN/TS) was approved by CEN on 8 May 2016 for provisional application.
The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to
submit their comments, particularly on the question whether the CEN/TS can be converted into a European Standard.
CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS
available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in
parallel to the CEN/TS) until the final decision about the possible conversion of the CEN/TS into an EN is reached.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and
United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2016 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TS 419221-1:2016 E
worldwide for CEN national Members.
Contents Page
European foreword . 3
Introduction . 4
1 Scope . 5
2 Normative references . 5
3 Terms and definitions . 5
4 Protection profiles specified in CEN/TS 419221 . 10
4.1 General . 10
4.2 CEN/TS 419221-2: Cryptographic module for CSP signing operations with backup . 10
4.3 CEN/TS 419221-3: Cryptographic module for CSP key generation services . 10
4.4 CEN/TS 419221-4: Cryptographic module for CSP signing operations without backup . 10
4.5 CEN/TS 419221-5: Cryptographic Module for Trust Services . 10
Bibliography . 12
European foreword
This document (CEN/TS 419221-1:2016) has been prepared by Technical Committee CEN/TC 224
“Personal identification and related personal devices with secure element, systems, operations and
privacy in a multi sectorial environment”, the secretariat of which is held by AFNOR.
This document supersedes CWA 14167-1:2003.
This document has been prepared under a mandate given to CEN by the European Commission and the
European Free Trade Association.
CEN/TS 419221, Protection Profiles for TSP cryptographic modules, is currently composed of the
following parts:
— Part 1: Overview;
— Part 2: Cryptographic module for CSP signing operations with backup;
— Part 3: Cryptographic module for CSP key generation services;
— Part 4: Cryptographic module for CSP signing operations without backup.
According to the CEN/CENELEC Internal Regulations, the national standards organisations of the
following countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Turkey and the United Kingdom.
Introduction
This multi-part standard specifies protection profiles for trust service provider cryptographic modules,
as per common criteria (ISO/IEC 15408 series). Target applications include signing by certification
service providers, as specified in Directive 1999/93, as well as supporting cryptographic services for
use by trust service providers.
1 Scope
This Technical Specification provides an overview of the protection profiles specified in other parts of
CEN/TS 419221.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
CEN/TS 419241, Security Requirements for Trustworthy Systems Supporting Server Signing
ISO/IEC 15408 (all parts) , Information technology — Security techniques — Evaluation criteria for IT
security
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
administrator
CSP user role that performs TOE initialization or other TOE administrative functions
Note 1 to entry: These tasks are mapped to the Crypto-officer role of the TOE.
3.2
advanced electronic signature
electronic signature which meets the following requirements (defined in Directive 1999/93/EC [1],
Article 2.2):
a) it is uniquely linked to the signatory;
b) it is capable of identifying the signatory;
c) it is created using means that the signatory can maintain under his sole control, and
d) it is linked to the data to which it relates in such a manner that any subsequent change of the data
are detectable
3.3
authentication data
information used to verify the claimed identity of a user
The following are equivalent to the aforementioned ISO/IEC 15408 standards:
— Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; Version 3.1,
Revision 3. CCMB-2009-07-001, July 2009;
— Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; Version 3.1,
Revision 3. CCMB-2009-07-002, July 2009;
— Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; Version 3.1,
Revision 3. CCMB-2009-07-003, July 2009.
3.4
auditor
user exporting the TOE audit data and reviewing the audit data with tools in the TOE environment
3.5
backup
export of the CSP_SCD, the TSF data and the system data (backup data) sufficient to recreate the state of
the TOE at the time the backup was created
Note 1 to entry: Backup is the only function which is allowed to export CSP_SCD and only if backup package is
implemented.
3.6
certificate
electronic attestation which links the SVD to a person and confirms the identity of that person (defined
in Directive 1999/93/EC [1], Article 2.9)
3.7
certificate generation application
CGA
collection of application elements which requests the SVD from the device generating the SCD/SVD pair
for generation of the qualified certificate
Note 1 to entry: The CGA stipulates the generation of a correspondent SCD/SVD pair, if the requested SVD has
not been generated by the SCD/SVD generation device yet. The CGA verifies the authenticity of the SVD by means
of (a) the SSCD proof of correspondence between SCD and SVD and (b) checking the sender and integrity of the
received SVD.
3.8
certification-service-provider
CSP
entity or a legal or natural person who issues certificates or provides other services related to
electronic signatures (defined in Directive 1999/93/EC [1], Article 2.11)
Note 1 to entry: In common usage this is often referred to as Certification Authority (CA). A CSP is a type of TSP.
3.9
cryptographic module
set of hardware, software and firmware used to generate the Subscriber-SCD/Subscriber-SVD pair and
which represents the TOE
3.10
CSP signature creation data
CSP_SCD
SCD which is used by the CSP, e.g. for the creation of advanced electronic signatures in qualified
certificates or for signing certificate status information
3.11
CSP signature verification data
CSP_SVD
SVD which corresponds to the CSP_SCD and which is used to verify the advanced electronic signature in
...
Frequently Asked Questions
CEN/TS 419221-1:2016 is a technical specification published by the European Committee for Standardization (CEN). Its full title is "Protection Profiles for TSP cryptographic modules - Part 1: Overview". This standard covers: This Technical Specification provides an overview of the protection profiles specified in other parts of CEN/TS 419221.
This Technical Specification provides an overview of the protection profiles specified in other parts of CEN/TS 419221.
CEN/TS 419221-1:2016 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding; 35.240.30 - IT applications in information, documentation and publishing. The ICS classification helps identify the subject area and facilitates finding related standards.
CEN/TS 419221-1:2016 is associated with the following European legislation: EU Directives/Regulations: 910/2014; Standardization Mandates: M/460. When a standard is cited in the Official Journal of the European Union, products manufactured in conformity with it benefit from a presumption of conformity with the essential requirements of the corresponding EU directive or regulation.
You can purchase CEN/TS 419221-1:2016 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CEN standards.








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...