Protection Profiles for TSP cryptographic modules - Part 1: Overview

This Technical Specification provides an overview of the protection profiles specified in other parts of FprCEN/TS 419221.

Schutzprofile für kryptographische Module von vertrauenswürdigen Dienstanbietern - Teil 1: Überblick

Profils de protection pour modules cryptographiques utilisés par les prestataires de services

Zaščitni profili za kriptografske module TSP - 1. del: Pregled

Ta tehnična specifikacija podaja pregled zaščitnih profilov, ki so določeni v drugih delih standarda FprCEN/TS 419221.

General Information

Status
Published
Publication Date
13-Nov-2016
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
29-Jul-2016
Due Date
03-Oct-2016
Completion Date
14-Nov-2016

Buy Standard

Technical specification
TS CEN/TS 419221-1:2017
English language
12 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST-TS CEN/TS 419221-1:2017
01-januar-2017
=DãþLWQLSURILOL]DNULSWRJUDIVNHPRGXOH763GHO3UHJOHG
Protection Profiles for TSP cryptographic modules - Part 1: Overview
Schutzprofile für kryptographische Module von vertrauenswürdigen Dienstanbietern - Teil
1: Überblick
Profils de protection pour modules cryptographiques utilisés par les prestataires de
services
Ta slovenski standard je istoveten z: CEN/TS 419221-1:2016
ICS:
35.040.01 Kodiranje informacij na Information coding in general
splošno
35.100.05 9HþVORMQHXSRUDEQLãNH Multilayer applications
UHãLWYH
SIST-TS CEN/TS 419221-1:2017 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST-TS CEN/TS 419221-1:2017

---------------------- Page: 2 ----------------------

SIST-TS CEN/TS 419221-1:2017


CEN/TS 419221-1
TECHNICAL SPECIFICATION

SPÉCIFICATION TECHNIQUE

July 2016
TECHNISCHE SPEZIFIKATION
ICS 35.040; 35.240.30 Supersedes CWA 14167-1:2003
English Version

Protection Profiles for TSP cryptographic modules - Part 1:
Overview
Profils de protection pour modules cryptographiques Schutzprofile für kryptographische Module von
utilisés par les prestataires de services de confiance - vertrauenswürdigen Dienstanbietern - Teil 1:
Partie 1 : Vue d'ensemble Überblick
This Technical Specification (CEN/TS) was approved by CEN on 8 May 2016 for provisional application.

The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to
submit their comments, particularly on the question whether the CEN/TS can be converted into a European Standard.

CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS
available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in
parallel to the CEN/TS) until the final decision about the possible conversion of the CEN/TS into an EN is reached.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and
United Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2016 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TS 419221-1:2016 E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------

SIST-TS CEN/TS 419221-1:2017
CEN/TS 419221-1:2016 (E)
Contents Page
European foreword . 3
Introduction . 4
1 Scope . 5
2 Normative references . 5
3 Terms and definitions . 5
4 Protection profiles specified in CEN/TS 419221 . 10
4.1 General . 10
4.2 CEN/TS 419221-2: Cryptographic module for CSP signing operations with backup . 10
4.3 CEN/TS 419221-3: Cryptographic module for CSP key generation services . 10
4.4 CEN/TS 419221-4: Cryptographic module for CSP signing operations without backup . 10
4.5 CEN/TS 419221-5: Cryptographic Module for Trust Services . 10
Bibliography . 12

2

---------------------- Page: 4 ----------------------

SIST-TS CEN/TS 419221-1:2017
CEN/TS 419221-1:2016 (E)
European foreword
This document (CEN/TS 419221-1:2016) has been prepared by Technical Committee CEN/TC 224
“Personal identification and related personal devices with secure element, systems, operations and
privacy in a multi sectorial environment”, the secretariat of which is held by AFNOR.
This document supersedes CWA 14167-1:2003.
This document has been prepared under a mandate given to CEN by the European Commission and the
European Free Trade Association.
CEN/TS 419221, Protection Profiles for TSP cryptographic modules, is currently composed of the
following parts:
— Part 1: Overview;
— Part 2: Cryptographic module for CSP signing operations with backup;
— Part 3: Cryptographic module for CSP key generation services;
— Part 4: Cryptographic module for CSP signing operations without backup.
According to the CEN/CENELEC Internal Regulations, the national standards organisations of the
following countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Turkey and the United Kingdom.
3

---------------------- Page: 5 ----------------------

SIST-TS CEN/TS 419221-1:2017
CEN/TS 419221-1:2016 (E)
Introduction
This multi-part standard specifies protection profiles for trust service provider cryptographic modules,
as per common criteria (ISO/IEC 15408 series). Target applications include signing by certification
service providers, as specified in Directive 1999/93, as well as supporting cryptographic services for
use by trust service providers.
4

---------------------- Page: 6 ----------------------

SIST-TS CEN/TS 419221-1:2017
CEN/TS 419221-1:2016 (E)
1 Scope
This Technical Specification provides an overview of the protection profiles specified in other parts of
CEN/TS 419221.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
CEN/TS 419241, Security Requirements for Trustworthy Systems Supporting Server Signing
1
ISO/IEC 15408 (all parts) , Information technology — Security techniques — Evaluation criteria for IT
security
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
administrator
CSP user role that performs TOE initialization or other TOE administrative functions
Note 1 to entry: These tasks are mapped to the Crypto-officer role of the TOE.
3.2
advanced electronic signature
electronic signature which meets the following requirements (defined in Directive 1999/93/EC [1],
Article 2.2):
a) it is uniquely linked to the signatory;
b) it is capable of identifying the signatory;
c) it is created using means that the signatory can maintain under his sole control, and
d) it is linked to the data to which it relates in such a manner that any subsequent change of the data
are detectable
3.3
authentication data
information used to verify the claimed identity of a user

1
The following are equivalent to the aforementioned ISO/IEC 15408 standards:
— Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; Version 3.1,
Revision 3. CCMB-2009-07-001, July 2009;
— Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; Version 3.1,
Revision 3. CCMB-2009-07-002, July 2009;
— Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; Version 3.1,
Revision 3. CCMB-2009-07-003, July 2009.
5

---------------------- Page: 7 ----------------------

SIST-TS CEN/TS 419221-1:2017
CEN/TS 419221-1:2016 (E)
3.4
auditor
user exporting the TOE audit data and reviewing the audit data with tools in the TOE environment
3.5
backup
export of the CSP_SCD, the TSF data and the system data (backup data) sufficient to recreate the state of
the TOE at the time the backup was created
Note 1 to entry: Backup is the only function which is allowed to export CSP_SCD and only if backup package is
implemented.
3.6
certificate
electronic attestation which links the SVD to a person and confirms the identity of that person (defined
in Directive 1999/93/EC [1], Article 2.9)
3.7
certificate generation application
CGA
collection of application elements which requests the SVD from the device generating the SCD/SVD pair
for generation of the qualified certificate
Note 1 to entry: The CGA stipulates the generation of a correspondent SCD/SVD pair, if the requested SVD has
not been generated by the SCD/SVD generation device yet. The CGA verifies the authenticity of the SVD by means
of (a) the SSCD proof of correspondence between SCD and SVD and (b) checking the sender and integrity of the
received SVD.
3.8
certification-service-provider
CSP
entity or a legal or natural person who issues certificates or provides other services related to
electronic signatures (defined in Directive 1999/93/EC [1], Article 2.11)
Note 1 to entry: In common usage this is often referred to as Certification Authority (CA). A CSP is a type of TSP.
3.9
cryptographic module
set of hardware, software and firmware used to generate the Subscriber-SCD/Subscriber-SVD pair and
which represents the TOE
3.10
CSP signature creation data
CSP_SCD
SCD which is used by the CSP, e.g. for the creation of advanced electronic signatures in qualified
certificates or for signing certificate status information
3.11
CSP signature verification data
CSP_SVD
SVD which corresponds to the CSP_SCD and which is used to verify the advanced electronic signature in
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.