Shopping Cart

No products in the cart.

BS EN 419211-2:2013

$189.07

Protection profiles for secure signature creation device – Device with key generation

Published By Publication Date Number of Pages
BSI 2013 46
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally: secure signature creation device with key generation (SSCD KG).

PDF Catalog

PDF Pages PDF Title
6 1 Scope
2 Normative references
3 Conventions and terminology
3.1 Conventions
3.2 Terms and definitions
4 PP introduction
4.1 PP reference
7 4.2 PP overview
8 4.3 TOE overview
4.3.1 Operation of the TOE
9 4.3.2 Target of evaluation
10 4.3.3 TOE lifecycle
4.3.3.1 General
11 4.3.3.2 Preparation stage
12 4.3.3.3 Operational use stage
13 5 Conformance claims
5.1 CC conformance claim
5.2 PP claim, Package claim
5.3 Conformance rationale
5.4 Conformance statement
6 Security problem definition
6.1 Assets, users and threat agents
14 6.2 Threats
6.2.1 T.SCD_Divulg Storing, copying and releasing of the signature creation data
6.2.2 T.SCD_Derive Derive the signature creation data
6.2.3 T.Hack_Phys Physical attacks through the TOE interfaces
6.2.4 T.SVD_Forgery Forgery of the signature verification data
6.2.5 T.SigF_Misuse Misuse of the signature creation function of the TOE
6.2.6 T.DTBS_Forgery Forgery of the DTBS/R
6.2.7 T.Sig_Forgery Forgery of the electronic signature
6.3 Organisational security policies
6.3.1 P.CSP_QCert Qualified certificate
15 6.3.2 P.QSign Qualified electronic signatures
6.3.3 P.Sigy_SSCD TOE as secure signature creation device
6.3.4 P.Sig_Non-Repud Non-repudiation of signatures
6.4 Assumptions
6.4.1 A.CGA Trustworthy certificate generation application
6.4.2 A.SCA Trustworthy signature creation application
7 Security objectives
7.1 Security objectives for the TOE
7.1.1 Relation to PP SSCD KI
16 7.1.2 OT.Lifecycle_Security Lifecycle security
7.1.3 OT.SCD/SVD_Auth_Gen Authorised SCD/SVD generation
7.1.4 OT.SCD_Unique Uniqueness of the signature creation data
7.1.5 OT.SCD_SVD_Corresp Correspondence between SVD and SCD
7.1.6 OT.SCD_Secrecy Secrecy of the signature creation data
7.1.7 OT.Sig_Secure Cryptographic security of the electronic signature
7.1.8 OT.Sigy_SigF Signature creation function for the legitimate signatory only
7.1.9 OT.DTBS_Integrity_TOE DTBS/R integrity inside the TOE
17 7.1.10 OT.EMSEC_Design Provide physical emanations security
7.1.11 OT.Tamper_ID Tamper detection
7.1.12 OT.Tamper_Resistance Tamper resistance
7.2 Security objectives for the operational environment
7.2.1 Relation to PP SSCD KI
7.2.2 OE.SVD_Auth Authenticity of the SVD
7.2.3 OE.CGA_QCert Generation of qualified certificates
7.2.4 OE.SSCD_Prov_Service Authentic SSCD provided by SSCD-provisioning service
7.2.5 OE.HID_VAD Protection of the VAD
18 7.2.6 OE.DTBS_Intend SCA sends data intended to be signed
7.2.7 OE.DTBS_Protect SCA protects the data intended to be signed
7.2.8 OE.Signatory Security obligation of the signatory
19 7.3 Security objectives rationale
7.3.1 Security objectives backtracking
7.3.2 Security objectives sufficiency
22 8 Extended components definition
23 9 Security requirements
9.1 Security functional requirements
9.1.1 Use of requirement specifications
9.1.2 Cryptographic support (FCS)
24 9.1.2.1 FCS_CKM.1 Cryptographic key generation
9.1.2.2 FCS_CKM.4 Cryptographic key destruction
9.1.2.3 FCS_COP.1 Cryptographic operation
25 9.1.3 User data protection (FDP)
9.1.3.1 FDP_ACC.1/SCD/SVD_Generation Subset access control
9.1.3.2 FDP_ACF.1/SCD/SVD_Generation Security attribute based access control
26 9.1.3.3 FDP_ACC.1/SVD_Transfer Subset access control
9.1.3.4 FDP_ACF.1/SVD_Transfer Security attribute based access control
28 9.1.3.5 FDP_ACC.1/Signature_Creation Subset access control
9.1.3.6 FDP_ACF.1/Signature creation Security attribute based access control
29 9.1.3.7 FDP_RIP.1 Subset residual information protection
9.1.3.8 FDP_SDI.2/Persistent Stored data integrity monitoring and action
30 9.1.3.9 FDP_SDI.2/DTBS Stored data integrity monitoring and action
9.1.4 Identification and authentication (FIA)
9.1.4.1 FIA_UID.1 Timing of identification
31 9.1.4.2 FIA_UAU.1 Timing of authentication
9.1.4.3 FIA_AFL.1 Authentication failure handling
32 9.1.5 Security management (FMT)
9.1.5.1 FMT_SMR.1 Security roles
9.1.5.2 FMT_SMF.1 Security management functions
9.1.5.3 FMT_MOF.1 Management of security functions behaviour
33 9.1.5.4 FMT_MSA.1/Admin Management of security attributes
9.1.5.5 FMT_MSA.1/Signatory Management of security attributes
9.1.5.6 FMT_MSA.2 Secure security attributes
34 9.1.5.7 FMT_MSA.3 Static attribute initialisation
9.1.5.8 FMT_MSA.4 Security attribute value inheritance
9.1.5.9 FMT_MTD.1/Admin Management of TSF data
35 9.1.5.10 FMT_MTD.1/Signatory Management of TSF data
9.1.6 Protection of the TSF (FPT)
9.1.6.1 FPT_EMS.1 TOE Emanation
9.1.6.2 FPT_FLS.1 Failure with preservation of secure state
36 9.1.6.3 FPT_PHP.1 Passive detection of physical attack
9.1.6.4 FPT_PHP.3 Resistance to physical attack
9.1.6.5 FPT_TST.1 TSF testing
37 9.2 Security assurance requirements
38 9.3 Security requirements rationale
9.3.1 Security requirement coverage
39 9.3.2 TOE Security Requirements Sufficiency
41 9.3.3 Satisfaction of dependencies of security requirements
42 9.3.4 Rationale for chosen security assurance requirements
BS EN 419211-2:2013
$189.07