Protection profiles for Trust Service Provider Cryptographic modules - Part 5: Cryptographic Module for Trust Services

This new part of TS 419 221 (419221-5) specifies a protection profile for cryptographic modules used by trust service providers supporting electronic signing and sealing operations and authentication services.  This protection profile includes support for protected backup of keys.
This protection profile is aimed at supporting trust services providers as identified by proposed regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS).
Note: This regulation is proposed to replace Directive 1999/93.  Has been approved by trialogue between the Council, Commission and parliament, the Committee of Permanent [Council] Representatives (COREPER) and is due to be put forward to the European Parliament on 3rd April.
Trust service providers targeted include those at supporting time-stamping, electronic seals and electronic signatures.

Schutzprofile für kryptographische Module von Vertrauensdienstanbietern - Teil 5: Kryptographisches Modul für vertrauenswürdige Dienste

Profils de protection pour les modules cryptographiques de prestataires de services de confiance - Partie 5: Module cryptographique pour les services de confiance

La présente partie de l’EN 419221 spécifie un Profil de Protection pour modules cryptographiques qui est destiné à être adapté à une utilisation par les prestataires de services de confiance prenant en charge les opérations de signatures et cachets électroniques, la délivrance et révocation de certificats, les opérations d'horodatage et les services d’authentification, telles qu’identifiées par le Règlement (UE) N° 910/2014 du Parlement européen sur l’identification électronique et les services de confiance pour les transactions électroniques au sein du marché intérieur [Règlement (UE) n° 910/2014 eIDAS] dans [10]. Le présent Profil de Protection couvre également la prise en charge facultative de la sauvegarde des clés protégées.
Le présent document applique les règles et conventions fixées dans les Critères Communs, Partie 1 [CC1], Annexe B « Spécification des profils de protection » (Common Criteria part 1 [CC1], Annex B « Specification of Protection Profiles »).

Zaščitni profili za ponudnike storitev zaupanja za kriptografske module - 5. del: Kriptografski modul za storitve zaupanja

Ta novi del standarda TS 419 221 (419221-5) določa zaščitni profil za kriptografske module, ki jih uporabljajo ponudniki storitev zaupanja ter ki podpirajo elektronske postopke podpisovanja in pečatenja in storitve za preverjanje pristnosti.  Ta zaščitni profil vključuje podporo za varnostno kopiranje ključev. Ta zaščitni profil je namenjen zagotavljanju podpore ponudnikom storitev zaupanja, kot so opredeljeni v predlagani uredbi Evropskega parlamenta in Sveta o elektronski identifikaciji in storitvah zaupanja za elektronske transakcije na notranjem trgu (eIDAS). Opomba: Ta uredba naj bi zamenjala Direktivo 1999/93.  Bila je potrjena v trialogih med Svetom, Komisijo in parlamentom, s strani Odbora stalnih predstavnikov [Sveta] (COREPER) in bo obravnavana v Evropskem parlamentu 3. aprila. Med ponudniki storitev zaupanja, ki so zajeti v uredbi, so tisti, ki omogočajo časovne žige, elektronske žige in elektronske podpise.

General Information

Status
Published
Public Enquiry End Date
12-Mar-2017
Publication Date
11-Jun-2018
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
22-May-2018
Due Date
27-Jul-2018
Completion Date
12-Jun-2018

Buy Standard

Standard
SIST EN 419221-5:2018
English language
79 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Schutzprofile für kryptographische Module von Vertrauensdienstanbietern - Teil 5: Kryptographisches Modul für vertrauenswürdige DiensteProfils de protection pour les modules cryptographiques de prestataires de services de confiance - Partie 5: Module cryptographique pour les services de confianceProtection profiles for Trust Service Provider Cryptographic modules - Part 5: Cryptographic Module for Trust Services35.240.30Uporabniške rešitve IT v informatiki, dokumentiranju in založništvuIT applications in information, documentation and publishing35.040.01Kodiranje informacij na splošnoInformation coding in generalICS:Ta slovenski standard je istoveten z:EN 419221-5:2018SIST EN 419221-5:2018en,fr,de01-julij-2018SIST EN 419221-5:2018SLOVENSKI

STANDARD
SIST EN 419221-5:2018
EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM
EN 419221-5
May
t r s z ICS
u wä r v rä r sâ
u wä t v rä u r English Version
Protection Profiles for TSP Cryptographic Modules æ Part

wã Cryptographic Module for Trust Services Profils de protection pour les modules cryptographiques de prestataires de services de confiance æ Partie

wã Module cryptographique pour les services de confiance
Schutzprofile für kryptographische Module von Vertrauensdienstanbietern æ Teil

wã Kryptographisches Modul für vertrauenswürdige Dienste This European Standard was approved by CEN on

t March
t r s zä

egulations which stipulate the conditions for giving this European Standard the status of a national standard without any alterationä Upætoædate lists and bibliographical references concerning such national standards may be obtained on application to the CENæCENELEC Management Centre or to any CEN memberä

translation under the responsibility of a CEN member into its own language and notified to the CENæCENELEC Management Centre has the same status as the official versionsä

CEN members are the national standards bodies of Austriaá Belgiumá Bulgariaá Croatiaá Cyprusá Czech Republicá Denmarká Estoniaá Finlandá Former Yugoslav Republic of Macedoniaá Franceá Germanyá Greeceá Hungaryá Icelandá Irelandá Italyá Latviaá Lithuaniaá Luxembourgá Maltaá Netherlandsá Norwayá Polandá Portugalá Romaniaá Serbiaá Slovakiaá Sloveniaá Spainá Swedená Switzerlandá Turkey and United Kingdomä

EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre:
Rue de la Science 23,
B-1040 Brussels

t r s z CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Membersä Refä Noä EN

v s { t t sæ wã t r s z ESIST EN 419221-5:2018

EN 419221-5:2018 (E) 2 Contents Page European foreword ....................................................................................................................................................... 5 Introduction .................................................................................................................................................................... 6 1 Scope .................................................................................................................................................................... 7 2 Normative references .................................................................................................................................... 7 3 Terms and definitions ................................................................................................................................... 8 3.1 Terms and definitions ................................................................................................................................... 8 3.2 Abbreviations ................................................................................................................................................... 9 4 Protection Profile ............................................................................................................................................ 9 4.1 General ................................................................................................................................................................ 9 4.2 Protection Profile Reference.................................................................................................................... 10 4.3 Protection Profile Overview ..................................................................................................................... 10 4.3.1 General ............................................................................................................................................................. 10 4.3.2 EU Qualified Electronic Signature / Seal Creation Device ............................................................. 11 4.4 TOE Overview ................................................................................................................................................ 11 4.4.1 TOE type .......................................................................................................................................................... 11 4.4.2 Usage and major security features of the TOE ................................................................................... 18 4.4.3 Available non-TOE hardware/software/firmware .......................................................................... 19 5 Conformance Claim ..................................................................................................................................... 19 5.1 CC Conformance Claim ............................................................................................................................... 19 5.2 PP Claim ........................................................................................................................................................... 19 5.3 Conformance Rationale .............................................................................................................................. 19 5.4 Conformance Statement ............................................................................................................................ 20 6 Security Problem Definition ..................................................................................................................... 20 6.1 Assets ................................................................................................................................................................ 20 6.2 Subjects ............................................................................................................................................................ 20 6.3 Threats ............................................................................................................................................................. 20 6.3.1 General ............................................................................................................................................................. 20 6.3.2 T.KeyDisclose — Unauthorised disclosure of secret/private key .............................................. 21 6.3.3 T.KeyDerive — Derivation of secret/private key ............................................................................. 21 6.3.4 T.KeyMod — Unauthorised modification of a key ............................................................................ 21 6.3.5 T.KeyMisuse — Misuse of a key ............................................................................................................... 21 6.3.6 T.KeyOveruse — Overuse of a key ......................................................................................................... 21 6.3.7 T.DataDisclose — Disclosure of sensitive client application data .............................................. 21 6.3.8 T.DataMod — Unauthorised modification of client application data ........................................ 21 6.3.9 T.Malfunction — Malfunction of TOE hardware or software ....................................................... 22 6.4 Organisational Security Policies ............................................................................................................. 22 6.4.1 P.Algorithms — Use of approved cryptographic algorithms ........................................................ 22 6.4.2 P.KeyControl — Support for control of keys ...................................................................................... 22 6.4.3 P.RNG — Random Number Generation ................................................................................................ 22 6.4.4 P.Audit — Audit trail generation ............................................................................................................ 23 6.5 Assumptions ................................................................................................................................................... 23 6.5.1 A.ExternalData — Protection of data outside TOE control ........................................................... 23 6.5.2 A.Env — Protected operating environment ........................................................................................ 23 6.5.3 A.DataContext — Appropriate use of TOE functions ....................................................................... 23 SIST EN 419221-5:2018

EN 419221-5:2018 (E) 3 6.5.4 A.UAuth — Authentication of application users ................................................................................ 24 6.5.5 A.AuditSupport — Audit data review .................................................................................................... 24 6.5.6 A.AppSupport — Application security support ................................................................................. 24 7 Security Objectives ....................................................................................................................................... 24 7.1 General ............................................................................................................................................................. 24 7.2 Security Objectives for the TOE ............................................................................................................... 24 7.2.1 General ............................................................................................................................................................. 24 7.2.2 OT.PlainKeyConf — Protection of confidentiality of plaintext secret keys ............................. 24 7.2.3 OT.Algorithms — Use of approved cryptographic algorithms ..................................................... 24 7.2.4 OT.KeyIntegrity — Protection of integrity of keys ........................................................................... 25 7.2.5 OT.Auth — Authorization for use of TOE functions and data ....................................................... 25 7.2.6 OT.KeyUseConstraint — Constraints on use of keys ........................................................................ 25 7.2.7 OT.KeyUseScope — Defined scope for use of a key after authorization ................................... 25 7.2.8 OT.DataConf — Protection of confidentiality of sensitive client application data ................ 26 7.2.9 OT.DataMod — Protection of integrity of client application data ............................................... 26 7.2.10 OT.ImportExport — Secure import and export of keys .................................................................. 26 7.2.11 OT.Backup — Secure backup of user data ........................................................................................... 26 7.2.12 OT.RNG — Random number quality ...................................................................................................... 27 7.2.13 OT.TamperDetect — Tamper Detection ............................................................................................... 27 7.2.14 OT.FailureDetect — Detection of TOE hardware or software failures ...................................... 27 7.2.15 OT.Audit — Generation of audit trail..................................................................................................... 27 7.3 Security Objectives for the Operational Environment .................................................................... 27 7.3.1 General ............................................................................................................................................................. 27 7.3.2 OE.ExternalData — Protection of data outside TOE control ......................................................... 27 7.3.3 OE.Env — Protected operating environment ..................................................................................... 28 7.3.4 OE.DataContext — Appropriate use of TOE functions ..................................................................... 28 7.3.5 OE.Uauth — Authentication of application users .............................................................................. 28 7.3.6 OE.AuditSupport — Audit data review ................................................................................................. 28 7.3.7 OE.AppSupport — Application security support ............................................................................... 29 8 Extended Components Definitions ......................................................................................................... 29 8.1 Generation of random numbers (FCS_RNG) ........................................................................................ 29 8.1.1 General ............................................................................................................................................................. 29 8.1.2 Family behaviour .......................................................................................................................................... 29 8.1.3 Component levelling .................................................................................................................................... 29 8.2 Basic TSF Self Testing (FPT_TST_EXT.1) ............................................................................................... 30 8.2.1 General ............................................................................................................................................................. 30 8.2.2 Family behaviour .......................................................................................................................................... 30 8.2.3 Component levelling .................................................................................................................................... 30 9 Security Requirements ............................................................................................................................... 31 9.1 General ............................................................................................................................................................. 31 9.2 Typographical Conventions ...................................................................................................................... 31 9.3 SFR Architecture ........................................................................................................................................... 31 9.3.1 SFR Relationships ......................................................................................................................................... 31 9.3.2 SFRs and the Key Lifecycle ........................................................................................................................ 33 9.4 Security Functional Requirements ......................................................................................................... 35 9.4.1 General ............................................................................................................................................................. 35 9.4.2 Cryptographic Support (FCS) .................................................................................................................... 35 9.4.3 Identification and authentication (FIA) ............................................................................................... 38 9.4.4 User data protection (FDP) ....................................................................................................................... 41 9.4.5 Trusted path/channels (FTP) ................................................................................................................... 47 9.4.6 Protection of the TSF (FPT) ....................................................................................................................... 49 9.4.7 Security management (FMT) .................................................................................................................... 51 SIST EN 419221-5:2018

EN 419221-5:2018 (E) 4 9.4.8 Security audit data generation (FAU) ................................................................................................... 58 9.5 Security Assurance Requirements ......................................................................................................... 60 9.5.1 General ............................................................................................................................................................. 60 9.5.2 Refinements of Security Assurance Requirements .......................................................................... 61 10 Rationales ....................................................................................................................................................... 65 10.1 Security Objectives Rationale .................................................................................................................. 65 10.1.1 Security Objectives Coverage ................................................................................................................... 65 10.1.2 Security Objectives Sufficiency................................................................................................................ 66 10.2 Security Requirements Rationale .......................................................................................................... 68 10.2.1 Security Requirements Coverage ........................................................................................................... 68 10.2.2 SFR Dependencies ........................................................................................................................................ 70 10.2.3 Rationale for SARs ....................................................................................................................................... 72 10.2.4 AVA_VAN.5 Advanced methodical vulnerability analysis .............................................................. 73 Annex A (informative)

Mapping to Regulation (EU) 910/2014 .................................................................. 74 Bibliography ................................................................................................................................................................. 79

Tables Table 1 — Key Attributes Modification Table

................................................................................................. 56 Table 2 — Key Attributes Initialisation Table 82 ............................................................................................. 57 Table 3 — Security Assurance Requirements .................................................................................................. 61 Table 4 — Security Problem Definition mapping to Security Objectives ............................................... 66 Table 5 — TOE Security Objectives mapping to SFRs .................................................................................... 68 Table 6 — SFR Dependencies Rationale ............................................................................................................. 71 Table A.1— Mapping between [Regulation, Annex II] and this PP ........................................................... 74

Figures Figure 1 — Generic TOE Architecture ................................................................................................................. 12 Figure 2 — Generation of Random numbers - Component Levelling ...................................................... 29 Figure 3 — Basic TSF Self Testing – Component Levelling .......................................................................... 30 Figure 4 — Architecture of Key Protection SFRs ............................................................................................. 32 Figure 5 — Architecture of User, TSF Protection and Audit SFRs ............................................................. 33 Figure 6 — Generic Key Lifecycle and Related SFRs ...................................................................................... 34 SIST EN 419221-5:2018

EN 419221-5:2018 (E) 5 European foreword This document (EN 419221-5:2018) has been prepared by Technical Committee CEN/TC 224 “Personal identification and related personal devices with secure element, systems, operations and privacy in a multi sectorial environment”, the secretariat of which is held by AFNOR. This European Standard shall be given the status of a national standard, either by publication of an identical text or by endorsement, at the latest by November 2018, and conflicting national standards shall be withdrawn at the latest by November 2018. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN shall not be held responsible for identifying any or all such patent rights. This document has been prepared under a mandate given to CEN by the European Commission and the European Free Trade Association. According to the CEN-CENELEC Internal Regulations, the national standards organisations of the following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. SIST EN 419221-5:2018

EN 419221-5:2018 (E) 6 Introduction Clause 4 provides the introductory material for the Protection Profile. Clause 5 provides the conformance claim. Clause 6 provides the Security Problem Definition. It presents the Assets, Threats, Organisational Security Policies and Assumptions related to the TOE. Clause 7 defines the security objectives for both the TOE and the TOE environment. Clause 8 presents the extended components that will be used in this PP. Clause 9 contains the functional requirements and assurance requirements derived from the Common Criteria (CC), Part 2 [CC2] and Part 3 [CC3] that are to be satisfied by the TOE. Clause 10 provides rationales to demonstrate that: — Security Objectives satisfy the policies and threats; — SFR match the security Objectives; — SFR dependencies are satisfied; — The SARs are appropriate. A Bibliography is provided to identify background material. A Mapping to the EU ‘Requirements For Qualified Electronic Signature Creation Devices’ is provided in Annex A. SIST EN 419221-5:2018

EN 419221-5:2018 (E) 7 1 Scope This part of EN 419221 specifies a Protection Profile for cryptographic modules which is intended to be suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (Regulation (EU) No 910/2014 eIDAS) in [10]. The Protection Profile also includes optional support for protected backup of keys. The document follows the rules and conventions laid out in Common Criteria Part 1 [CC1], Annex B “Specification of Protection Profiles”. 2 Normative references The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 19790:2012, Information technology — Security techniques — Security requirements for cryptographic modules Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model (Version 3.1 Revision 4, September 2012), CCMB-2012-09-001 [CC1] Common Criteria for Information Technology Security Evaluation, Part 2: Security functional requirements, (Version 3.1 Revision 4, September 2012), CCMB-2012-09-002 [CC2] Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance requirements, (Version 3.1 Revision 4, September 2012), CCMB-2012-09-003 [CC3] SIST EN 419221-5:2018

EN 419221-5:2018 (E) 8 3 Terms and definitions 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in EN 419221-1, Common Criteria Part 1 [CC1] and the following apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: — IEC Electropedia: available at http://www.electropedia.org/ — ISO Online browsing platform: available at http://www.iso.org/obp 3.1.1 assigned key key (usually a secret key) with the ‘Assigned Flag’ attribute set to ‘assigned’, meaning that: — the ‘Re-authorization conditions’ and ‘Key Usage’ attributes cannot be changed; — the Authorization Data attribute can only be changed by presentation of the current Authorization Data – it cannot be changed or reset by an Administrator; — the key cannot be imported or exported. Note 1 to entry: These properties of an Assigned Key support the sole control of a key that is required for secret keys used to create digital signatures. 3.1.2 Authorization Data data, including data particular to the user, which is used to control access to (and thus use of) a key. Data particular to the user may include data derived from a secret known only by the user, data derived from a device held by the user and/or data derived from biometric features of the user. Other parts of the authorization data may include data held within the cryptographic module, data held by administrator(s) or data provided by the application 3.1.3 electronic seal data in electronic form which is attached to or logically associated with other data in electronic form to ensure the latter’s origin and integrity 3.1.4 electronic timestamp data in electronic form which binds other data in electronic form to a particular time establishing evidence that the latter data existed at that time 3.1.5 secret key either a secret key used in symmetric cryptographic functions, or a private key used in asymmetric cryptographic functions SIST EN 419221-5:2018

EN 419221-5:2018 (E) 9 3.1.6 trust service electronic service which enhances trust and confidence in electronic transactions Note 1 to entry: Such trust services are typically but not necessarily using cryptographic techniques or involving confidential material. 3.2 Abbreviations For the purposes of this document, the abbreviations given in EN 419221-1 and the following apply. CC Common Criteria DTBS Data To Be Signed DTBS/R Data To Be Signed or its unique Representation EAL Evaluation Assurance Level IT Information Technology PCIe Peripheral Component Interconnect Express PP Protection Profile RNG Random Number Generator SAR Security Assurance Requirements SFP Security Function Policy SFR Security Functional Requirements ST Security Target TOE Target of Evaluation TSF TOE Security Functionality TSFI TSF Interface TSP Trust Service Provider 4 Protection Profile 4.1 General This clause provides document management and overview information that is required to carry out Protection Profile registration. 4.2 “PP Reference” gives labelling and descriptive information necessary for registering the Protection Profile (PP). 4.3 “Protection Profile Overview” summarizes the PP in narrative form. 4.4 “TOE Overview” summarizes the TOE in a narrative form. As such, these subclauses give an overview to the potential user to decide whether the PP is of interest. SIST EN 419221-5:2018

EN 419221-5:2018 (E) 10 4.2 Protection Profile Reference Title Protection Profiles for TSP Cryptographic Modules – Part 5: Cryptographic Module for Trust Services CC revision v3.1 release 4 PP version 1.0 Authors CEN/TC 224 Keywords cryptographic module 4.3 Protection Profile Overview 4.3.1 General This Protection Profile (PP) defines the security requirements for cryptographic modules used by trust service providers supporting electronic signing and sealing operations and authentication services. It includes optional support for protected backup of keys. The Protection Profile is aimed at supporting trust services providers as identified by the proposed regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in Regulation (EU) 910/2014 [7]. The Cryptographic Module, which is the Target of Evaluation (TOE), generates and/or protects secret keys and other sensitive data, and allows controlled use of these data for one or more cryptographic services in support of TSP trust services. This PP is Common Criteria Part 2 [CC2] extended and Co

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.