Home
CC EAL5+ Certification Security Target
Contents
1. M7820 Infineon PUBLIC Security Target 3 Conformance Claims ASE_CCL 3 1 CC Conformance Claim This Security Target ST and the TOE claim conformance to Common Criteria version v3 1 part 1 2 part 2 3 and part 3 4 Conformance of this ST is claimed for Common Criteria part 2 extended and Common Criteria part 3 conformant 3 2 PP Claim This Security Target is in strict conformance to the Security IC Platform Protection Profile 1 The Security IC Platform Protection Profile is registered and certified by the Bundesamt f r Sicherheit in der Informationstechnik BSI under the reference BSI PP 0035 Version 1 0 dated 15 06 2007 The security assurance requirements of the TOE are according to the Security IC Platform Protection Profile 1 They are all drawn from Part 3 of the Common Criteria version v3 1 The augmentations of the PP 1 are listed below Table 6 Augmentations of the assurance level of the TOE Assurance Assurance Class components Description Life cycle ALC DVS2 oufficiency of security measures support Vulnerability AVA VAN 5 Advanced methodical vulnerability analysis assessment 3 3 Package Claim This Security Target does not claim conformance to a package of the PP 1 The assurance level for the TOE is EALS augmented with the components ALC DVS 2 and AVA VAN 5 6 Bundesamt f r Sicherheit in der Informationstechnik BSI is the German Federal Authority for Information S
2. The TSF shall perform hash value calculation of user chosen data in accordance with a specified cryptographic algorithm SHA 2 and with cryptographic key sizes of none that meet the following standards U S Department of Commerce National Bureau of Standards Secure Hash Algorithm FIPS PUB 180 3 2008 October section 6 2 SHA 256 and section 6 4 SHA 512 V0 5 Date 2010 06 10 Page 64 73 M7820 Infineon PUBLIC Security Target The covered security functional requirement is FCS_COP 1 SHA 8 5 6 TRNG Random data is essential for cryptography as well as for security mechanisms The TOE is equipped with a physical True Random Number Generator TRNG FCS RNG 1 The random data can be used from the Smartcard Embedded Software and is also used from the security features of the TOE like masking The TRNG implements also self testing features The TRNG fulfils the requirements from the functionality class P2 of the AIS31 6 The covered security functional requirement is FCS RNG 1 FPT PHP 3 FDP ITT 1 FPT ITT 1 FPT TST 2 and FPT FLS 1 The SF CS Cryptographic Support covers the security functional requirements FCS COP 1 RSA FCS CKM 1 RSA FCS COP 1 ECDSA FCS CKM 1 EC FCS COP 1 ECDH ECB COP 1 SHA FPT PHP 3 FDP ITT 1 FPT ITT 1 FPT TST 2 FPT FLS 1 and FCS RNG 1 Note 20 The cryptographic libraries RSA EC and SHA 2 are delivery options Therefore the TOE may come with free combinations of or without th
3. In addition the Smartcard Embedded Software must implement functions which perform operations on keys if any in such a manner that they do not disclose information about confidential data The non disclosure due to leakage A Key Function attacks is included in this objective OE Plat Appl This addition ensures that the assumption A Plat Appl is still covered by the objective OE Plat Appl although additional functions are being supported according to O Add Functions Compared to the PP 1 a clarification has been made for the security objective Treatment of User Data OE Resp Appl By definition cipher or plain text data and cryptographic keys are User Data o0 the Smartcard Embedded Software will protect such data if required and use keys and functions appropriately in order to ensure the strength of cryptographic operation Quality and confidentiality must be maintained for keys that are imported and or derived from other keys This implies that appropriate key management has to be realised in the environment That is expressed by the assumption A Key Function which is covered from OE Resp Appl These measures make sure that the assumption A Resp Appl is still covered by the security objective OE Resp Appl although additional functions are being supported according to P Add Functions Compared to the PP 1 an enhancement regarding memory area protection has been established The clear definition of privilege levels for operated software estab
4. refer to the Common Criteria assurance class AGD such as the hardware data sheet and the hardware application notes and ii findings of the TOE evaluation reports relevant for the Security IC Embedded Software as documented in the certification report Treatment of User Data All User Data are owned by Security IC Embedded Software Therefore it must be assumed that security relevant User Data especially cryptographic keys are treated by the Security IC Embedded Software as defined for its specific application context The support of cipher schemas needs to make an additional assumption Table 10 Assumption according PP 1 A Process Sec IC Protection during Packaging Finishing and Personalization A Plat Appl Usage of Hardware Platform A Resp Appl Treatment of User Data V0 5 Date 2010 06 10 Page 27 73 M7820 Infineon PUBLIC Security Target 4 3 1 Augmented Assumptions The developer of the Smartcard Embedded Software must ensure the appropriate Usage of Key dependent Functions A Key Function while developing this software in Phase 1 as specified below A Key Function Usage of Key dependent Functions Key dependent functions if any shall be implemented in the omartcard Embedded Software in a way that they are not susceptible to leakage attacks as described under T Leak Inherent and T Leak Forced Note that here the routines which may compromise keys when being executed are part o
5. Card amp Security 2010 03 SLE SLM 70 Family Programmer s User Manual 2009 07 SLE78 Confidential Errata Sheet 1 01 018 2010 03 11 SLE70 Crypto Library RSA ECC User Interface for Crypto 2304T optional 2009 11 SHA 2 Library Manual optional 2010 03 12 Crypto 2304T User Manual 2010 06 SLx Controller Security Guidelines Protection Profile 1 0 2007 06 15 Security IC Platform Protection Profile PP0035 3 1 Common Criteria 2009 July Common Criteria for Information Technology Security Evaluation Part 1 Introduction and general model CCMB 2009 07 001 Part 2 Security functional requirements Revision 3 CCMB 2009 07 002 Part 3 Security Assurance Components CCMB 2009 07 003 V0 5 Date 2010 06 10 Page 6 73 M7820 Security Target Infineon PUBLIC Remarks to the Target of Evaluation TOE All products based on the M7820 representing this TOE are identically from hardware perspective and produced with the same masks The first metal mask called M1 mask contains the derivate specific information e g development code design step memory size Depending on the blocking configuration an M7820 product can have different user available memory sizes and can come with or without individual accessible cryptographic co processors For example a product with the Mnumber M7820 in the field can come in one project with the fully available EEPROM or in another project with equal or any other EE
6. Cl same as Cl Central Processing Unit Cyclic Redundancy Check Asymmetric Cryptographic Processor Chinese Reminder Theorem Differential Power Analysis Differential Failure Analysis Elliptic Curve Error Correction Code Error Detection Code Error Detection Unit Electrically Erasable and Programmable Read Only Memory Electro magnetic analysis EEPROM Flash Memory Hardware Integrated Circuit Internal Clock Oscillator Identification Interface Management Module Interrupt and Peripheral Event Channel Controller Input Output Internal Random Access Memory Information Technology Security Evaluation Criteria Mechanism Memory Encryption and Decryption Memory Management Unit Object Operating system V0 5 Date 2010 06 10 Page 70 73 M7820 PUBLIC Security Target PEC PRNG PROM RMS RNG ROM RSA SAM SCP SF SFR SPA STS SW SO TM TOE TRNG TSC TSF UART UM UmSLC WDT XRAM 3DES Peripheral Event Channel Pseudo Random Number Generator Programmable Read Only Memory Random Access Memory Resource Management System Random Number Generator Read Only Memory Rives Shamir Adleman Algorithm Service Algorithm Minimal Symmetric Cryptographic Processor Security Feature Special Function Register as well as Security Functional Requirement The specific meaning is given in the context Simple power analysis self Test Software Software Security objective Threat Test Mode STS Target of Ev
7. Data A Resp Appl However the Smartcard Embedded Software may comprise different parts for instance an operating system and one or more applications In this case such parts may accidentally or deliberately access data including code of other parts which may result in a security violation The TOE shall avert the threat Memory Access Violation T Mem Access as specified below T Mem Access Memory Access Violation Parts of the Smartcard Embedded Software may cause security violations by accidentally or deliberately accessing restricted data which may include code or privilege levels Any restrictions are defined by the security policy of the specific application context and must be implemented by the Smartcard Embedded Software V0 5 Date 2010 06 10 Page 24 73 M7820 Infineon PUBLIC Security Target Table 8 Additional threats due to TOE specific functions and augmentations Memory Access Violation For details see PP 1 section 3 2 4 1 2 Assets regarding the Threats The primary assets concern the User Data which includes the user data as well as program code Security IC Embedded Software stored and in operation and the provided security services These assets have to be protected while being executed and or processed and on the other hand when the TOE is not in operation This leads to four primary assets with its related security concerns e SC1 Integrity of User Data and of the Security IC
8. Embedded Software while being executed processed and while being stored in the TOE s memories e SC2 Confidentiality of User Data and of the Security IC Embedded Software while being processed and while being stored in the TOE s memories e SC3 Correct operation of the security services provided by the TOE for the Security IC Embedded Software e C4 Continuous availability of random numbers SC4 is an additional security service provided by this TOE which is the availability of random numbers These random numbers are generated either by a true random number or a deterministic random number generator or by both when a true random number is used as seed for the deterministic random number generator Note that the generation of random numbers is a requirement of the PP 1 To be able to protect he listed assets the TOE shall protect its security functionality as well Therefore critical information about the TOE shall be protected Critical information includes e logical design data physical design data IC Dedicated Software and configuration data e Initialisation Data and Pre personalisation Data specific development aids test and characterisation related data material for software development support and reticles The information and material produced and or processed by the TOE Manufacturer in the TOE development and production environment Phases 2 up to TOE Delivery can be grouped as follows e logical design data e ph
9. Hardware Reference Manual the SLE SLM 70 Family Production Personalization Manual the SLE SLM 70 Family Programmer s User Manual and the SLE70 Family Errata Sheet which contains the description of all interfaces of the software to the hardware relevant for programming the TOE The manual Crypto2304T Library User Interface contains all interfaces of the RSA and EC library and is only delivered to the user in case the RSA library and or the EC library is are part of the delivered TOE The SHA 2 library manual contains all interfaces of the SHA 2 library and is only delivered to the user in case the SHA 2 library is part of the delivered TOE V0 5 Date 2010 06 10 Page 19 73 M7820 Infineon PUBLIC Security Target The SLE70 Family Errata Sheet may be changed during the life cycle of the TOE This is reported in a monthly updated list 5 provided from Infineon Technologies AG to the user Finally the certification report may contain an overview of the recommendations to the software developer regarding the secure use of the TOE These recommendations are also included in the ordinary documentation 2 2 5 Forms of delivery The TOE can be delivered in form of complete modules in form of plain wafers or in an IC case e g DSO20 or in bare dies The delivery can therefore be at the end of phase 3 or at the end of phase 4 which can also include pre personalization steps according to PP 1 Nevertheless in both cases the TOE i
10. OF THE TOE 16 2 2 1 Haldware OF ME TOE nz 0 EaR rs ee een 16 2 2 2 Firmware and software of the TOE 18 2 2 3 IPIEM ACES OF Me TOE 19 2 2 4 GUI AN CS GO CIATION 19 2 2 5 Fonnes OF CUVEE ne alia nerd nu asia Unda Reese ee 20 2 2 6 TOO DCHON SMCS een ae een ee ee ern 20 3 CONFORMANCE CLAIMS ASE TEL riet 21 3 1 CE CONFORMANCE CLAIM ee ee ee ee ee 21 8 2 PP CAIM S 21 Do ge d cebFln H een 21 3 4 CONFORMANCE RATIONALE sssssseseeeenee een nene nemen nasesi sese sese sese iiie si esi sese sese isse ssa sessi rens 22 4 SECURITY PROBLEM DEFINITION ASE SPD 1 eeseeieleeiei enhn nenne nena mne nun nn nun nn nn nun 24 4 1 Uc 24 4 1 1 Additional Threat due to TOE specific Functionality sees 24 4 1 2 Assets regarding the Threats uus2s2s2s2s0nnnon nennen nun nhnsnsushs suse se sese ese ese sea anna 20 4 2 ORGANIZATIONAL SECURITY POLES e e e e enne nennen nenne ennemi sese sire se sese sa sena seas 26 4 2 1 Augmented Organizational Security PoliCy esses essen nna 26 4 3 ASSUMPTOMS x e e nene 27 4 3 1
11. ROM and or the NVM or coming without user software In the latter case the user downloads his entire software on his own using the Flash Loader software The TOE uses also Special Function Registers SFR These SFR registers are used for general purposes and chip configuration These registers are located in the EEPROM as configuration area page The bus system comprises two separate bus entities a memory bus supporting the AXI M protocol Advanced eXtensible Interface and an APB Advanced Peripheral Bus for high speed communication with the peripherals An intelligent shielding algorithm finishes the upper layers above security critical signals and wires finally providing the so called F shield The following is a list of features provided by this TOE e 24 bit linear addressing e Upto 16 MByte of addressable memory e Register based architecture registers can be accessed as bytes words 2 bytes and doublewords 4 bytes e 2 stage instruction pipeline e Extensive set of powerful instructions including 16 and 32 bit arithmetic and logic instructions e Cache with single cycle access searching e 16 bit ALU e Minimum instruction execution time of one clock The TOE sets a new improved gandard of integrated security features thereby meeting the requirements of all smart card applications such as information integrity access control mobile telephone and identification as well as uses in electronic funds transfer and
12. The timer permits easy implementation of communication protocols such as T 1 and all other time critical operations The UART controlled I O interface allows the smart card controller and the terminal interface to be operated independently The Clock Unit CLKU supplies the clocks for all components of the TOE The Clock Unit can work in an internal and external clock mode When operating in the internal clock mode the system frequency may be varied in a range of approximately 1 MHz up to 33 MHz in steps of roughly 1 MHz This enables a programmer to choose the best fitting frequency for an application in consideration of a potential current limit and a demanded application performance The frequencies are derived from the 33 MHz clock of an internal VCO VCOCLK whereas the system clock SYSCLK may either be based on the internal 33 MHz VCO clock VCOCLK or on an external clock such as the clock of the CB interface EXTCLK In this external clock mode the system clock is derived from an externally applied interface clock according to a defined dependency The system frequency may be 1 up to 8 times the externally applied frequency but is of course limited to the maximum system frequency of 33 MHz Two co processors for cryptographic operations are implemented on the TOE The Crypto2304T for calculation of asymmetric algorithms ike RSA and Elliptic Curve EC and the Symmetric Cryptographic Processor SCP for dual key or triple key triple DES and
13. a specified cryptographic key generation algorithm rsagenT PKCS v2 1 RFC3447 and specified cryptographic key sizes of 1024 4096 bits that meet the following standard According to section 3 2 2 in PKCS v2 1 RFC3447 for u 2 i e without any r_i d_i t i 1 2 For p x q lt 2 additionally according to section 3 2 1 Note 9 For easy integration of RSA functions into the user s operating system and or application the library contains single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note Note 10 The TOE can be delivered with or without the RSA2048 library In the case of coming without the library the TOE does not provide the Additional Specific Security Functionality Rivest Shamir Adleman Cryptography RSA realized with the security functional requirements FCS COP 1 RSA and ECS CKM 1 RSA In case of a blocked Crypto2304T no cryptographic libraries are delivered End of note Elliptic Curve DSA ECDSA operation The Modular Arithmetic Operation of the TOE shall meet the requirement Cryptographic operation ECS COP 1 as specified below V0 5 Date 2010 06 10 Page 43 73 M7820 Infineon PUBLIC Security Target FCS_COP 1 ECDSA Cryptographic operation Hierarchical to No other components Dependenci
14. based Memory Access Control O Mem Access as specified below O Mem Access Area based Memory Access Control The TOE must provide the Smartcard Embedded Software with the capability to define restricted access memory areas The TOE must then enforce the partitioning of such memory areas so that access of software to memory areas and privilege levels is controlled as required for example in a multi application environment Table 12 Additional objectives due to TOE specific functions and augmentations O Add Functions Additional specific security functionality Area based Memory Access Control 5 2 Security Objectives for the development and operational Environment The security objectives for the security IC embedded software development environment and the operational environment is defined in PP 1 section 4 2 and 4 3 The table below lists the security objectives Table 13 Security objectives for the environment according to PP 1 Phase 1 OE Plat Appl Usage of Hardware Platform OE Resp Appl Treatment of User Data Phase 5 6 OE Process Sec IC Protection during composite optional Phase 4 product manufacturing 5 2 1 Clarification of Usage of Hardware Platform OE Plat Appl Regarding the cryptographic services this objective of the environment has to be clarified The TOE supports cipher schemes as additional specific security functionality If required the Smartcard Embedded Software shall use these cryptographic servic
15. by another call to our function 2 According to sections 6 2 6 2 2 6 2 3 in ISO IEC 15946 2 2002 Not implemented is section 6 2 1 The output of 5 4 2 has to be provided by the caller as input to the function Signature Verification 1 According to section 7 4 1 in ANSI X9 62 2005 Not implemented is step b and c thereof The output of step c has to be provided as input to our function by the caller Deviation of step d Beside noted calculation our algorithm adds a random multiple of BasepointerOrder n to the calculated values u1 and u2 2 According to sections 6 4 6 4 1 6 4 3 6 4 4 in ISO IEC 15946 2 2002 Not implemented is section 6 4 2 The output of 5 4 2 has to be provided by the caller as input to the V0 5 Date 2010 06 10 Page 63 73 M7820 Infineon PUBLIC Security Target function Asymmetric Key Generation The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm Elliptic Curve EC specified in ANSI X9 62 1998 and ISO IEC 15946 1 2002 and specified cryptographic key sizes 192 521 bits that meet the following standard ECDSA Key Generation 1 According to the appendix A4 3 n ANSI X9 62 2005 the cofactor h is not supported 2 According to section 6 1 not 6 1 1 in ISO IEC 15946 1 2002 Asymmetric Key Agreement The TSF shall perform elliptic curve Diffie Hellman key agreement in accordance with a specified cryptographic
16. depends on the customer demands prior to the production of the hardware In case the SCP is blocked no AES and 3DES computation supported by hardware is possible In case the Crypto2304T is blocked no RSA and EC computation supported by hardware is possible The use of the SHA 2 library is also possible with both crypto coprocessors blocked No accessibility of the deselected cryptographic V0 5 Date 2010 06 10 Page 26 73 Infineon M7820 PUBLIC Security Target CO processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors End of note 4 3 Assumptions The TOE assumptions on the operational environment are defined and described in PP 1 section 3 4 The assumptions concern the phases where the TOE has left the chip manufacturer A Process Sec IC A Plat Appl A Resp Appl Protection during Packaging Finishing and Personalization It is assumed that security procedures are used after delivery of the TOE by the TOE Manufacturer up to delivery to the end consumer to maintain confidentiality and integrity of the TOE and of its manufacturing and test data to prevent any possible copy modification retention theft or unauthorised use Usage of Hardware Platform The Security IC Embedded Software is designed so that the requirements from the following documents are met i TOE guidance documents
17. executed By this clearly defined management functions are implemented enforced by the MMU and the covered security functional requirement is FMT SMF 1 V0 5 Date 2010 06 10 Page 57 73 M7820 Infineon PUBLIC Security Target During the testing phase in production within the secure environment the entire EEPROM is deleted The covered security functional requirement is FPT_PHP 3 Each operation phase is protected by means of authentication and encryption The covered security functional requirements are FDP_ITT 1 and FPT_ITT 1 The SF_DPM Device Phase Management covers the security functional requirements FAU SAS 1 FMT LIM 1 FMT LIM 2 FDP_ACC 1 FDP ACF 1 FMT MSA 1 FMT_MSA 3 FMT SMF 1 FPT PHP 3 FDP ITT 1 and FPT ITT 1 8 2 SF PS Protection against Snooping All contents of all memories of the TOE are encrypted on chip to protect against data analysis on stored data as well as on internally transmitted data There is no plain data on the chip In addition the data transferred over the memory bus AXI bus to and from bi directional encryption the CPU Co processor Crypto2304T and SCP the special SFRs and the peripheral devices CRC RNG and Timer are encrypted automatically with a dynamic key change The memory content and bus encryption is done by the MED using a complex key management This means that the EEPROM RAM CACHE and the bus are encrypted with module dedicated and dynamic keys The only
18. following description Table 14 Security Objective Rationale Assumption Threat or Organisational Security Policy Security Objective P Add Functions O Add Functions OE Plat Appl OE Resp Appl The justification related to the security objective Additional Specific Security Functionality O Add Functions is as follows Since O Add Functions requires the TOE to implement exactly the same specific security functionality as required by P Add Functions the organisational security policy is covered by the objective A Key Function Nevertheless the security objectives O Leak Inherent O Phys Probing O Malfunction O Phys Manipulation and O Leak Forced define how to implement the specific security functionality required V0 5 Date 2010 06 10 Page 31 73 M7820 Infineon PUBLIC Security Target by P Add Functions Note that these objectives support that the specific security functionality is provided in a secure way as expected from P Add Functions Especially O Leak Inherent and O Leak Forced refer to the protection of confidential data User Data or TSF data in general User Data are also processed by the specific security functionality required by P Add Functions Compared to PP 1 clarification has been made for the security objective Usage of Hardware Platform OE Plat Appl If required the Smartcard Embedded Software shall use these cryptographic services of the TOE and their interface as specified
19. for the RAM ROM and EEPROM The TOE shall meet the requirement Stored data integrity monitoring and action FDP SDI 2 as specified below FDP SDI 2 Stored data integrity monitoring and action Hierarchical to FDP SDI 1 stored data integrity monitoring Dependencies No dependencies FDP SDI 2 1 The TSF shall monitor user data stored in containers controlled by the TSF for data integrity and one and or more bit errors on all objects based on the following attributes corresponding EDC value for RAM ROM and EEPROM and error correction ECC for the EEPROM FDP SDI 2 2 Upon detection of a data integrity error the TSF shall correct 1 bit errors in the EEPROM automatically and inform the user about more bit errors V0 5 Date 2010 06 10 Page 47 73 ee j M7820 hs Infineon PUBLIC Security Target 7 2 TOE Security Assurance Requirements The evaluation assurance level is EAL 5 augmented with ALC_DVS 2 and AVA VAN 5 In the following table the security assurance requirements are given The augmentation of the assurance components compared to the Protection Profile 1 is expressed with bold letters Table 17 Assurance components Development ADV AHC oecurity Architecture Description In PP 1 ADV FSP 5 in ST Complete semi formal functional specification with additional error information ADV IMP 1 Implementation representation of the in PP 1 TSF Guidance AGD OPE 1 Operational user guidance in PP 1 Lif
20. hardware is possible In case the Crypto2304T is blocked no RSA and EC computation supported by hardware is possible The use of the SHA 2 library is also possible with both crypto coprocessors blocked No accessibility of the deselected cryptographic co processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors End of note 9 For the case the TOE comes without RSA and or EC library the TOE provides basic HW related routines for RSA and or EC calculations For a secure library implementation the user has to implement additional countermeasures on his own 10 The CFB is also called Recrypt Mode V0 5 Date 2010 06 10 Page 41 73 M7820 Infineon PUBLIC Security Target AES Operation The AES Operation of the TOE shall meet the requirement Cryptographic operation ECR COP 1 as specified below FCS COP 1 AES Cryptographic operation Hierarchical to No other components Dependencies FDP ITC 1 Import of user data without security attributes or FDP ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction FCS COP 1 1 AES The TSF shall perform encryption and decryption in accordance with a specified cryptographic algorithm Advanced Encryption Standard AES and cryptographic key sizes of 128 bit or 192 bit or 256 bittha
21. healthcare systems To sum up the TOE is a powerful smart card dual interface IC with a large amount of memory and special peripheral devices with improved performance optimized power consumption free ot chose contact based or contactless operation at minimal chip size while implementing high security It therefore constitutes the basis for future smart card applications V0 5 Date 2010 06 10 Page 15 73 Pc M7820 Infin eon PUBLIC Security Target Figure 1 Block diagram of the TOE AXITM Memory Bus 32 bit CPU2 Security Peripherals ICO 2x Timer ITP PEC Clock Unit Unit TRNG PRNG amp WDT E 3 Peripheral Bus 16 bit i UART Interface Crypto 2304T Voltage Power Bi mt Control 2 2 Scope ofthe TOE The TOE comprises as one part the hardware of the smart card security controller in various configurations as listed in Table 3 and Table 4 All products of this TOE including also the different configurations and resulting chip identifier bytes are manufactured by Infineon Technologies AG Note that future configurations of this TOE result in different chip identifier bytes which today are not listed in this ST The listing of Table 4 contains therefore the product of this TOE as present today and covered by the certificate New configuration can be added by additional certification processes i e assurance continuity processes maintenance The various blocking options of m
22. in terms of performance and security The SLE70 family provides a common architecture upon which specific products can be tailored for markets ranging from low security applications SLE76 up to high security and contactless applications SLE78 Rivest Shamir Adleman asymmetric cryptographic algorithm The Elliptic Curve Cryptography is abbreviated with EC only in the further in order to avoid conflicts with the abbreviation for the Error Correction Code ECC SHA Secure Hash Algorithm V0 5 Date 2010 06 10 Page 10 73 M7820 Infineon PUBLIC Security Target The TOE is intended to be used in smart cards for particularly high security relevant applications This new product family features a new security philosophy focussing on data integrity By that three main principles combined in close synergy are utilized in the new security concept called the Integrity Guard The Integrity Guard consists of the main elements full error detection full encryption and intelligent active shielding This dual interface controller is able to communicate using either the contact based or the contactless interface The implemented dual interface provides a maximum flexibility in using different communication protocols ISO 7816 ISO 14443 Type A and Type B FELICA ISO IEC 18092 passive mode and Mifare compatible Interface can be chosen and configured The TOE provides a real 16 bit CPU architecture and is compatible to t
23. key remaining static over the product life cycle is the specific ROM key changing from customer mask to mask All transfer of addresses or data via the APB is dynamically masked and thus protected against readout and analysis No data in plain are handled anywhere on the TOE and thus also the two CPUs compute entirely masked and in addition dynamic mask changes are applied Also the register files are masked The symmetric cryptographic co processor is entirely masked at any time and also here the masks change dynamically The CACHE being in ongoing use during operation is entirely and dynamically encrypted The encryption covers the data processing policy and FDP IFC 1 Subset information flow control The covered security functional requirements are FPT PHP 3 FDP IFC 1 FPT ITT 1 and FDP ITT 1 The user can define his own key for an EEPROM area to protect his data This user individually chosen key is then delivered by the operating system and included in the dynamic EEPROM encryption The user specified EEPROM area is then encrypted with his key and a dynamic component Ihe encryption of the memories is performed by the MED with a proprietary cryptographic algorithm and with a complex and dynamic key management providing protection against cryptographic analysis attacks The few keys which have to be stored on the chip for example the user chosen key and the chip specific ROM key are protected against read out The covered security function
24. level is increased from informal to semi formal with informal description The refinement is not touched from this measure For details of the refinement see PP 1 7 3 Security Requirements Rationale 7 3 1 Rationale for the Security Functional Requirements The security functional requirements rationale of the TOE are defined and described in PP 1 section 6 3 for the following security functional requirements FDP ITT 1 FDP IFC 1 FPT ITT 1 FPT PHP 3 EDT FLS 1 FRU FLT 2 FMT LIM 1 FMT LIM 2 FCS_RNG 1 and EAU SAS 1 The security functional requirements FPT TST 2 FDP ACC 1 FDP ACF 1 FMT MSA 1 FMT MSA 3 FMT SMF 1 FCS COP 1 FCS CKM 1 FDP SDI 1 and FDP SDI 2 are defined in the following description V0 5 Date 2010 06 10 Page 49 73 m O O M7820 Infineon PUBLIC Security Target Table 18 Rational for additional SFR in the ST Objective TOE Security Functional Requirements O Add Functions FCS_COP 1 DES Cryptographic operation FCS COP 1 AES Cryptographic operation FCS COP 1 SHA Cryptographic operation FCS_COP 1 RSA Cryptographic operation FCS_COP 1 ECDSA Cryptographic operation FCS_COP 1 ECDH Cryptographic operation FCS_CKM 1 RSA Cryptographic key generation FCS CKM 1 EC Cryptographic key generation O Mem Access FDP_ACC 1 Subset access control FDP ACF 1 Security attribute based access control FMT_MSA 3 Static attribute initialisation FMT MSA 1 Ma
25. operating system and or application the library contains single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note Note 14 The TOE can be delivered without the EC library In this case the TOE does not provide the Additional Specific Security Functionality Elliptic Curve Cryptography realised with the security functional requirements FCS COP 1 ECSA ECS COP 1 ECDH and FCS CKM 1 EC In case of a blocked Crypto2304T no cryptographic libraries are delivered End of note Note 15 The EC primitives allow the selection of various curves The selection of the curves depends to the user End of note SHA 2 Operation The SHA 2 Operation of the TOE shall meet the requirement Cryptographic operation FCS COP 1 as specified below FCS COP 1 SHA Cryptographic operation Hierarchical to No other components Dependencies FDP ITC 1 Import of user data without security attributes or FDP ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction FCS COP 1 SHA The TSF shall perform hash value calculation of user chosen data in accordance with a specified cryptographic algorithm SHA 2 and with cryptographic key sizes of none that meet the following standaras U S Department o
26. operational capability Firmware Part of the software implemented as hardware Hardware Physically present part of a functional system item Integrated Circuit Component comprising several electronic circuits implemented in a highly miniaturized device using semiconductor technology Internal Random Access Memory RAM integrated in the CPU Mechanism Logic or algorithm which implements a specific security function in hardware or software Memory Encryption and Decryption Method of encoding decoding data transfer between CPU and memory Memory Hardware part containing digital information binary data Microprocessor CPU with peripherals Object Physical or non physical part of a system which contains information and is acted upon by subjects Operating System ooftware which implements the basic TOE actions necessary for operation Programmable Read Only Memory Non volatile memory which can be written once and then only permits read operations Handom Access Memory Volatile memory which permits write and read operations V0 5 Date 2010 06 10 Page 72 73 Infineon M7820 PUBLIC Security Target Random Number Generator Read Only Memory Resource Management System SCP Self Test Software Security Function Security Target Smart Card Software Subject Target of Evaluation Test Mode Threat User Mode Hardware part for generating random numbers Non volatile memory which permits read operations only Part of the fi
27. that the environment shall meet the requirements FCS CKM 1 and FCS CKM 4 as defined in 3 section 10 1 and shall meet the requirements FDP ITC 1 or FDP ITC 2 as defined in 3 section 11 7 For the security functional requirement FCS COP 1 RSA ECS _COP 1 ECDSA and FCS COP 1 ECDH the respective dependencies FCS_CKM 4 and FDP ITC 1 or FDP ITC 2 have to be fulfilled by the environment That mean that the environment shall meet the requirements FDP ITC 1 or FDP ITC 2 as defined in 3 section 11 7 The respective dependency FCS CKM 1 has to be fulfilled by the TOE with the security functional requirement FCS CKM 1 RSA for FCS COP 1 RSA and ECS CKM 1 EC for FCS COP 1 ECDSA and ECS COP 1 ECDH as V0 5 Date 2010 06 10 Page 54 73 M7820 Infineon PUBLIC Security Target defined in section 7 1 4 Additionally the requirement FCS CKM 1 can be fulfilled by the environment as defined in 3 section 10 1 For the security functional requirement FCS CKM 1 RSA and FCS CKM 1 EC the respective dependency ECS COP is fulfilled by the TOE The environment covers the respective dependency FCS CKM 4 hat mean that the environment shall meet the requirement FCS CKM 4 as defined in 3 section 10 1 The cryptographic libraries RSA EC and SHA 2 are delivery options Therefore the TOE may come with free combinations of or without these libraries In the case of coming without one or any combination of these libraries the TOE does not prov
28. the access so that accesses to be denied can not be utilised by the subject attempting to perform the operation FDP_ACF 1 3 The TSF shall explicitly authorize access of subjects to objects based on the following additional rules none FDP ACF 1 4 The TSF shall explicitly deny access of subjects to objects based on the following additional rules none The TOE shall meet the requirement Static attribute initialisation FMT_MSA 3 as specified below FMT MSA 3 otatic attribute initialisation V0 5 Date 2010 06 10 Page 39 73 M7820 Infineon PUBLIC Security Target Hierarchical to No other components Dependencies FMT_MSA 1 Management of security attributes FMT_SMR 1 Security roles FMT_MSA 3 1 The TSF shall enforce the Memory Access Control Policy to provide well defined default values for security attributes that are used to enforce the SFP FMT_MSA 3 2 The TSF shall allow any subject provided that the Memory Access Control Policy is enforced and the necessary access is therefore allowed to specify alternative initial values to override the default values when an object or information is created The TOE shall meet the requirement Management of security attributes FMT_MSA 1 as specified below FMT MSA 1 Management of security attributes Hierarchical to No other components Dependencies FDP ACC 1 Subset access control or FDP IFC 1 Subset information flow control FMI SMF 1 Specificatio
29. to the SAB 80251 instruction set 8051 is a subset hereof and is multiple times faster than the standard processor It provides additional powerful instructions for smart card applications It thus meets the requirements for the new generation of operating systems Despite its compatibility the CPU implementation is entirely proprietary and not standard The CPU here the two processors CPU1 and CPU2 are seen from functional perspective as one accesses the memory via the integrated Memory Encryption and Decryption unit MED The access rights of the application to the memories can be controlled with the memory management unit MMU Errors in the memories are automatically detected EDC and in terms of the EEPROM 1 Bit errors are also corrected ECC The two processors of the CPU control each other in order to detect faults and maintain by this the data integrity A comparator detects whether a calculation was performed without errors and allows error detection even while processing Therefore the TOE V0 5 Date 2010 06 10 Page 13 73 M7820 Infineon PUBLIC Security Target is equipped with a full error detection capability for the complete data path which does not leave any parts of the circuitry unprotected The controllers of this TOE store both code and data in a linear 16 MByte memory space allowing direct access without the need to swap memory segments in and out of memory using a memory management unit The e
30. 01 60d8cfa2cf34d78 3a988d0958195d07b472210c38d6bb33c3e0064a330506e80628e3d55c9282e35 CI70 LIB Ak XSMALL HUGE lib v1 1 Build 18 827651 422e0df665adaf73a7299fd591 d9e7510e47f72cb99848a6f2d 04effcebf58a75 eb cba2bd70ff7e358ca3337b61888ea2ca65186386141567c0886d7a7169b37 CI70 LIB ecc XSMALL HUGE lib v1 1 Build 18 ffa80d661 88cica4c22daec80ec6d421 e3ec43bd1fc61df6ada886770b77687d6dc2f3d6 2db67db47fe03345a9ce2fcd7ba52c8a4b57844fe2b0741cdd600150bb1aea8d CI70 ROM XSMALL HUGE lib 97d57bd73a8d8c6c26ac0911224ad880 ae08b2787108a1 1bb0c8d863ad39706696f78352 b1d71b6130812ad43b560a1ced42d84a9678643e374e73a69db 1384329844106 SHA 2 values computed from SLE70 SHA2 Lib RE 1v01 2009 06 29 LIB 70d2df490185b41 9fb820d597d82d 117 df1 5ff79b5f5ab70bbad0ee031953e1877cabd47 765fc5d47cf8274833476406b24010a56ebcfd4b0972704ddd27e2d3e3e086f8 SHA 256 V0 5 Date 2010 06 10 Page 69 73 Infineon PUBLIC M7820 Security Target 11 List of Abbreviations AES AIS31 APBTM API AXITM CC Cl CIM CPU CRC Crypto2304T CRT DPA DFA EC ECC EDC EDU EEPROM EMA Flash HW Advanced Encryption Standard Anwendungshinweise und Interpretationen zu ITSEC und CC Funktionalit tsklassen und Evaluationsmethodologie f r physikalische Zufallszahlengeneratoren Advanced Peripheral Bus Application Programming Interface Advanced eXtensible Interface Bus Protocol Common Criteria Chip Identification Mode STS CI Chip Identification Mode STS
31. 7 73 a M7820 Infineon PUBLIC Security Target The security service being provided is described in the Security Function Policy SFP Memory Access Control Policy The security functional requirement Subset access control FDP_ACC 1 requires that this policy is in place and defines the scope were it applies The security functional requirement Security attribute based access control FDP_ACF 1 defines security attribute usage and characteristics of policies It describes the rules for the function that implements the Security Function Policy SFP as identified in FDP_ACC 1 The decision whether an access is permitted or not is taken based upon attributes allocated to the software The omartcard Embedded Software defines the attributes and memory areas The corresponding permission control information is evaluated on the fly by the hardware so that access is granted effective or denied inoperable The security functional requirement Static attribute initialisation FMT MSA 3 ensures that the default values of security attributes are appropriately either permissive or restrictive in nature Alternative values can be specified by any subject provided that the Memory Access Control Policy allows that This is described by the security functional requirement Management of security attributes FMT MSA 1 The attributes are determined during TOE manufacturing FMT MSA 3 or set at run time EMT MSA 1 From TOE s point of
32. AES calculations These CO processors are especially designed for smart card applications with respect to the security and power consumption The SCP module computes the complete DES algorithm within a few clock cycles and is especially designed to counter attacks like DPA EMA and DFA Note that this TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both crypto co processors blocked The blocking depends on the customer demands prior to the production of the hardware No accessibility of the deselected cryptographic co processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors The STS self test software RMS Resource Management System Service Algorithm Minimal SAM and Flash Loader together compose the TOE firmware stored in the ROM All mandatory functions for internal testing production usage and start up behaviour STS and also the RMS and V0 5 Date 2010 06 10 Page 14 73 M7820 Infineon PUBLIC Security Target SAM functions are grouped together in a common privilege level These privilege levels are protected by a hardwired Memory Management Unit MMU setting The user software can be implemented in various options depending on the user s choice and described in chapter 1 1 Thereby the user software can be implemented in the
33. Augmented ASSUMPHONE nun 28 5 SECURITY OBJECTIVES ASE OBS ee nn eon AARETE EER 29 5 1 SECURITY OBJECTIVES FOR THE TOE 29 5 2 SECURITY OBJECTIVES FOR THE DEVELOPMENT AND OPERATIONAL ENVIRONMENT eee 30 5 2 1 Clarification of Usage of Hardware Platform OE Plat Appl essere 30 5 2 2 Clarification of Treatment of User Data OE Hesp Appl sess 31 5 2 0 Clarification of Protection during Composite product manufacturing OE Process Sec IC 31 5 3 SECURITY OBJECTIVES RA IONALE ee ee aa ee nee nee AANEEN UNEN ASEEN 31 6 EXTENDED COMPONENT DEFINITION ASE_ECD u u42s u020 000000nunannunan nun nn nun eena nun ann 33 6 1 COMPONENT SUBSET TOE SECURITY TESTING FPT_TST eee 33 6 2 DERNIMON OF FPI TO Wc acetate een ee reine 33 6 3 TSF SELF TEST FPT IST aiceccsctatcnntedeetucsouctencbed ccteupesedcensehdesensosniecededcsienvasetecasebdetanecsateenhebassensess 34 7 SECURITY REQUIREMENTS ASE REO 4 0 2 0 142u00000026 RS nee 35 7 1 TOE SECURITY FUNCTIONAL REQUIREMENTS 0 ccccccssccecsccececseeeeeaceeeaeeneasvaeeteaseeeeneaeeneaeenvaneaeaneases 35 V0 5 Date 2010 06 10 Page 2 73 pam s M7820 Infineon PUBLIC Security Target 7 1 1 Extended Components ECS HNG 1 and FAU_SAS 1 ccccccccccecececececececeaeeeetesensneceseaenenees 36 7 1 2 SUDEELOT TOE LES Em 37 7 1 3 METION AGCOSS CONC ME E PP 37 7 1 4 SUPHO Of Cipher Schem
34. Cinfineon PUBLIC Infineon Technologies AG Chipcard and Security Evaluation Documentation Security Target M7820 A11 including optional Software Libraries RSA EC SHA 2 Version 0 5 Date 2010 06 10 Author Hans Ulrich Buchm ller J rgen Noller Filename Security Target_SLE78 M7820 doc 2010 Infineon Technologies AG All rights reserved This document and all information contained therein is considered confidential and proprietary of Infineon technologies AG The recipient of this dcument shall not disclose this document or the information contained herein in whole or in part to any third party Infineon technologies AG reserves the right to change the specification or parts of it without prior notice M7820 Infineon PUBLIC Security Target REVISION HISTORY 2009 02 01 Initial Version 2010 02 11 Update User Guidance Reference 2010 03 15 Editorial corrections in chapter 1 1 and 10 2010 03 12 Update ofthe TOE Definition 2010 06 10 Upate in User Guidance Document TABLE OF CONTENTS 1 SECURITY TARGET INTRODUCTION ASE INT sss ss ss ssc ccc eee eee eee eee 5 1 1 SECURITY TARGET AND TARGET OF EVALUATION REFERENCE 2 0ccececcecsececeeeeeeeeeeeeeeeeeeeeeseeaeeseaenees 5 1 2 TARGET OF EVALUATION OVERVIEW e e e e ee 10 2 TARGET OF EVALUATION DESCRIPTION uu u eu ee ee 13 2 1 TOE DEFINITION 13 2 2 SCORE
35. Encryption Standard AES and cryptographic key sizes of 128 bit or 192 bit or 256 bit that meet the standard U S Department of Commerce National Institute of Standards and Technology Information Technology Laboratory ITL Advanced Encryption Standard AES FIPS PUB 197 The covered security functional requirement is ECS COP 1 AES 8 5 3 RSA Encryption Decryption Signature Generation and Verification The TSF shall perform encryption and decryption in accordance with a specified cryptographic algorithm Rivest Shamir Adleman RSA and cryptographic key sizes 1024 4096 bits that meet the following standards Encryption According to section 5 1 1 RSAEP in PKCS v2 1 RFC3447 Without 5 1 1 1 Decryption with or without CRT According to section 5 1 2 RSADP in PKCS v2 1 RFC3447 for u 2 i e Wthout any r_i d i t 1 152 therefore without 5 1 2 2 b ii amp v without 5 1 2 1 5 1 2 2 a only supported up to n lt 2 Signature Generation with or without CRT According to section 5 2 1 RSASP171 in PKCS v2 1 RFC3447 for u 2 i e without any r_i d i t 1 i 52 therefore without 5 2 1 2 b ii amp v without 5 2 1 1 5 2 1 2 a only supported up to n lt 2 9 Signature Verification According to section 5 2 2 RSAVP1 in PKCS v2 1 RFC3447 without 5 2 2 1 Asymmetric Key Generation 11 CFB is also called Recrypt Mode V0 5 Date 2010 06 10 Page 62 73 M7820 Infineon PUB
36. IC dedicated software and optional RSAv1 1 18 ECv1 1 18 and SHA 2v1 1 libraries The target of evaluation TOE M7820 A11 is described in the following The Security Target has the revision 0 5 and is dated 2010 06 10 The Target of Evaluation TOE is an Infineon smart card IC Security Controller M7820 A11 with optional RSA2048 4096 v1 1 18 EC v1 1 18 and SHA 2 v1 1 libraries and with specific IC dedicated software More details are listed in Table 1 Identification and its blocked derivatives listed in Table 3 The design step is a11 The Security Target is based on the Protection Profile Smartcard IC Platform Protection Profile 1 The Protection Profile and the Security Target are built in compliance with Common Criteria v3 1 The ST takes into account all relevant current final interpretations V0 5 Date 2010 06 10 Page 5 73 Bee oe M7820 Infineon PUBLIC Security Target Table 1 Identification Security Target 2010 06 10 M7820 A11 Target of Evaluation ait M7820 with Flash Loader 3 60 009 and Overall Patch 80 OF including RMS V8000B001B and STS v78 01 09 09 and STS Patch 80 09 and SAM v2 0 b22 and optional SW RSA2048 v1 01 018 optional and RSA4096 v1 01 018 optional and ECv1 01 018 optional and SHA 2 v1 1 optional and guidance documentation Guidance Edition 2010 01 SLE SLM 70 Family Hardware Documentation Reference Manual 2009 04 SLE SLM 70 Family Production Personali zation Manual Chip
37. LIC Security Target The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm RSA specified in PKCS 1 v2 1 and specified cryptographic key sizes of 1024 4096 bits that meet the following standard According to section 3 2 2 in PKCS v2 1 RFC3447 for u 2 i e without any r_i d i t i 1 2 For p x q lt ZYP additionally according to section 3 2 1 Note 18 For easy integration of RSA functions into the user s operating system and or application the library contains single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note The covered security functional requirement is FCS_COP 1 RSA and FCS CKM 1 RSA 8 5 4 EC Signature Generation and Verification The TSF shall perform signature generation and signature verification in accordance with a specified cryptographic algorithm ECDSA and cryptographic key sizes 192 521 bits that meet the following standard Signature Generation 1 According to section 7 3 in ANSI X9 62 2005 Not implemented is step d and e thereof The output of step e has to be provided as input to our function by the caller Deviation of step c and f The jumps to step a were substituted by a return of the function with an error code the jumps are emulated
38. LIM 1 and FMT LIM 2 During the production phase phase 3 and 4 or after the delivery to the customer phase 5 or phase 6 the TOE provides the possibility to download after a successful authentication process a user specific encryption key and user code and data into the empty erased EEPROM flash memory area as specified by the associated control information of the Flash Loader software This process is only possible after a successful authentication process The integrity of the loaded data is checked with a signature process The data to ke loaded may be transferred optionally in encrypted form After finishing the load operation the Flash Loader can be permanently deactivated so that no further load operation with the Flash Loader is possible These procedures are defined as phase operation limitation The covered security functional requirement is FPT LIM 2 Limited availability During operation within a phase the accesses to memories are granted by the MMU controlled access rights and related privilege level The covered security functional requirements are FDP_ACC 1 FDP_ACF 1 and FMT MSA 1 In addition during each start up of the TOE the address ranges and access rights are initialized by the STS with predefined values The covered security functional requirement is FMT MSA 3 The TOE clearly defines access rights and privilege levels in conjunction with the appropriate key management in dependency of the firmware or software to be
39. PHP 3 EDD SDI 1 and FDP SDI 2 If a user tears the card resulting in a power off situation during an NVM programming operation or if other perturbation is applied no data or content loss occurs and the TOE restarts power on The NVM tearing save write functionality covers FPT FLS 1 Failure with preservation of secure state since if the programming was not successful the old data are still present and valid which ensures a secure state although a programming failure occurred This action includes also FDP SDI 1 Stored data integrity monitoring as the new data to be programmed are checked for integrity and correct programming before the page with the old data becomes the new physical page for the next new data The covered security functional requirement is also FPT PHP 3 Resistance to physical attack since these measures make it difficult to manipulate the write process of the NVM The covered security functional requirements are FPT FLS 1 FPT PHP 3 and FDP SDI 1 V0 5 Date 2010 06 10 Page 59 73 M7820 Infineon PUBLIC Security Target The TOE is protected against fault and modifying attacks The core provides the functionality of double computing and result comparison of all tasks to detect incorrect calculations The detection of an incorrect calculation is stored and the TOE enters a defined secure state which causes the chip internal reset process The implementation of two CPUs computing on the same data i
40. PROM size below the physical implementation size depending on the user requirements And more the user is free to choice prior to production whether he needs the symmetric co processor SCP or the asymmetric co processor Crypto2304T or both or none of them In addition the user is also free to choice whether the TOE comes with a free combination of delivered cryptographic libraries or without any The entire configuration is done during the manufacturing process of the TOE according to the choice of the user All differences between the products of this TOE are realized by means of blocking without changing the hardware Therefore all products of this TOE are equal from hardware perspective The blocking of the EEPROM is done by setting the according value in the chip configuration page which is not available to the user The same means of blocking are also used for switching on and off the accessibility of the cryptographic co processors SCP and or Crypto2304T and also for the configuration of the XRAM and ROM sizes The memory settings are done during the production process by programming the physical start and end address of the user available memory areas The entire configuration page including also the other blocking information can not be changed by the user afterwards and is protected against manipulation This TOE is equipped with Flash Loader software FL to allow the download of user software i e the operating system and app
41. RSA modulus recalculation RsaModulus The module provides the basic long number calculations add subtract multiply square with 1100 bit numbers with high performance The RSA library is delivered as object code or object code and in this way integrated in the user software The RSA library can perform RSA operations from 512 to 4096 bits Depending on the customer s choice the TOE can be delivered with the 4096 code portion or with the 2048 code portion only The 2048 code portion is included in both Parts of the evaluation are only operations with key length from 1024 bits to 2048 bits and 4096 bits with or without making use of the CRT Note that key lengths below 1024 bit are not included in the certificate The EC library is used to provide a high level interface to Elliptic Curve cryptography and includes countermeasures against SPA DPA and DFA attacks The routines are used for ECDSA signature generation ECDSA signature verification ECDSA key generation and Elliptic Curve Diffie Hellman key agreement The EC library is delivered as object code or object code and in this way integrated in the user software The EC library can perform EC operations on elliptic curve parameters with key lengths up to 533 bits Included in the evaluation are only operations with key length of 192 to 521 bits The SHA 2 library provides the calculation of a hash value of freely chosen data input in the CPU The SHA 2 library is delivered as object code an
42. SECURITY FUNCTIONAL REQUIREMENTS TO TOE S SECURITY FUNCTIONALITY 65 8 7 SECURITY REQUIREMENTS ARE INTERNALLY CONSISTENT sssssesseeenen nemen enne e nemen mense nennen 67 9 REFERENCES n 68 9 1 zl cC TU T E E E 68 10 APPENDIR qu 69 11 LIST OF ABBREVIATIONS nissen a ee ona x DU OUR uM PM cN e IB M EUH NEMUS NE 70 12 GLOSSAR rs P 72 V0 5 Date 2010 06 10 Page 3 73 M7820 Infineon PUBLIC Security Target List of tables Table 1 Identification uuu00222000000ennnnnnnnnennnnnnnnnnennnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnsnnnnnnnnnnnnnnnnnnnnn 6 Table 2 Options to implement user software at Infineon production premises 7 Table 3 Basic Configurations of the TOE eee 8 Table 4 Today s defined configuration derivatives of the M7820 sees 9 Table 5 Production site in chip identification 222222000002200n00neennnnnnnnnnnnnnnnnnnnnnnnnnnnnne nn 20 Table 6 Augmentations of the assurance level of the TOE eee 21 Table 7 Threats according PP Ii ee eee 24 Table 8 Additional threats due to TOE specific functions and augmentations 25 Table 9 Organizational Security Policies according PP IT eee 26 T
43. TST 2 As physical effects or manipulative attacks may also address the program flow of the user software a watchdog timer and a check point register are implemented These features allow the user to check the correct processing time and the integrity of the program flow of the user software Another measure against modifying and perturbation respectively differential fault attacks DFA is the implementation of backward calculation in the SCP By this induced errors are discovered The covered security functional requirements are FPT_FLS 1 FDP_IFC 1 FPT_ITT 1 FDP_ITT 1 and FPT_PHP 3 The RMS provides the user also the testing of all security features enabled to generate an alarm This security testing is called user mode security life control UMSLC As attempts to modify the security features will be detected from the test the covered security functional requirement is FPT_TST 2 All communication via the busses is in addition protected by a monitored hardware handshake If the handshake was not successful an alarm is generated The covered security functional requirements are FPT_FLS 1 and FPT_PHP 3 The virtual memory system and privilege level model are enforced by the MMU This controls the access rights throughout the TOE There is a clear differentiation within the privilege levels defined V0 5 Date 2010 06 10 Page 60 73 M7820 Infineon PUBLIC Security Target The covered security functional requirements a
44. T_MSA 1 and EMT MSA 3 is considered to be satisfied because the access control specified for the intended TOE is not role based but enforced for each subject Therefore there is no need to identify roles in form of a security functional requirement FMT SMH 1 End of note comment Comment 3 The security functional requirement Cryptographic operation FCS_COP 1 met by the TOE has the following dependencies FDP_ITC 1 Import of user data without security attributes or FDP ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction The security functional requirement Cryptographic key management FCS _CKM met by TOE has the following dependencies FCS CKM 2 Cryptographic key distribution or FCS COP Cryptographic operation FCS CKM 4 Cryptographic key destruction These requirements all address the appropriate management of cryptographic keys used by the specified cryptographic function and are not part of the PP 1 Most requirements concerning key management shall be fulfilled by the environment since the Smartcard Embedded Software is designed for a specific application context and uses the cryptographic functions provided by the TOE For the security functional requirement FCS COP 1 DES and FCS COP 1 AES the respective dependencies FCS_CKM 1 FCS CKM 4 and FDP_ITC 1 or FDP ITC 2 have to be fulfilled by the environment That mean
45. able 10 ASSUMPTION according PP LT nee ae tta tnea E 27 Table 11 Objectives for the TOE according to PP 1 ccccccccsssssseeeeeeeeeeeeeesseceeeeeeeseeeeseeeeeeees 29 Table 12 Additional objectives due to TOE specific functions and augmentations 30 Table 13 Security objectives for the environment according to PP 1 30 Table 14 Security Objective Rationale eeeeeeeesssssseeeeee eene 31 Table 15 Security functional requirements defined in PP 1 ss 22220040000000 RBB 35 Table 16 Augmented security functional requirements esse eee eee eee eee e eee e eee 35 Table 17 Assurance coImpoPenlS sisescerteer dri abba EXx ipae edd ERES Gag t a Dv E FRI aie Ed ERE rare 48 Table 18 Rational for additional SFR in the ST eee 50 Table 19 Dependency for cryptographic operation requirement esse eee eee ee eee ee eee 53 Table 20 Mapping of SFR and SBE sese 66 Table 21 Reference hash values of the CL70 Crypto LIDrarieS cccceeeeeseeeeeeeeeeeeeeeeeeeeeeeesaaeeees 69 V0 5 Date 2010 06 10 Page 4 73 M7820 Infineon PUBLIC Security Target 1 Security Target Introduction ASE_INT 1 1 Security Target and Target of Evaluation Reference The title of this document is Security Target ST and comprises the Infineon Technologies Smart Card IC Security Controller M7820 A11 with specific
46. al requirements are FPT PHP 3 FDP IFC 1 FPT ITT 1 and FDP ITT 1 The CPU has no standard command set and discloses therefore no possibility for deeper analysis The covered security functional requirement is FPT PHP 3 The entire design is kept in a non standard way to prevent attacks using standard analysis methods A smartcard dedicated CPU with a non public bus protocol is used which makes analysis very complicated and time consuming Besides the proprietary structures also the internal timing behaviour is proprietary and by this aggravating significantly the analysis in addition Important parts of the chip are especially designed to counter leakage or side channel attacks like DPA SPA or EMA DEMA Therefore even the physical data gaining is difficult to perform since timing and current consumption is independent of the dynamically encrypted masked and randomized processed data In the design a number of components are automatically synthesized and mixed up to disguise an attacker and to make an analysis more difficult A further protective design method used is secure wiring All security critical wires have been identified and protected by special routing measures against probing Additionally he wires are V0 5 Date 2010 06 10 Page 58 73 M7820 Infineon PUBLIC Security Target embedded into shield lines and used as normal signal lines for operation of the chip to prevent successful probing This measurement is c
47. algorithm ECDH and cryptographic key sizes 192 521 bits that meet the following standara 1 According to section 5 4 1 in ANSI X9 63 2001 Unlike section 5 4 1 3 our implementation not only returns the x coordinate of the shared secret but rather the x coordinate and y coorainate 2 According to sections 8 4 2 1 8 4 2 2 8 4 2 3 and 8 4 2 4 in ISO IEC 15946 3 2002 The function enables the operations described in the four sections Note 19 For easy integration of EC functions into the user s operating system and or application the library contains single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note The covered security functional requirements are FCS COP 1 ECDSA FCS CKM 1 EC and FCS COP 1 ECDH 8 5 5 SHA 2 The TOE comes optionally with the SHA 2 library for hash value calculation Regarding the SHA 2 library it has to be noted that the secure hash algorithm SHA 2 is intended to be used for signature generation verification and generic data integrity checks The use for keyed hash operations like HMAC or similar security critical operations involving keys is not subject of this TOE and requires specific security improvements and DPA analysis including the operating system which is not part of this TOE Nevertheless following is valid
48. alled implicit shielding or short F shielding The covered security functional requirements are FPT PHP 3 FPT ITT 1 and FDP ITT 1 In addition to their protection during processing of code and data their storage in the EEPROM is protected against side channel attacks too Even if users operate with direct and static addressing for storing their secrets the addresses are always translated to virtual addresses if the address call is in the correct privilege level which is monitored by the MMU The covered security functional requirements are FPT PHP 3 FPT ITT 1 and FDP ITT 1 In contrast to the linear virtual address range the physical EEPROM pages are transparently and dynamically scrambled on every page modification This scrambling is entirely independent from the user software and the MMU In addition a software controlled refreshing of memory pages is implemented which exchanges the physical location of a memory page by reprogramming it to another location n dependency of the performed write cycles but also including randomness The link between the physical address and the virtual address is stored internally and is not accessible by the operating system This measurement causes that the physical location of data is different from chip to chip even the same software may use the same virtual addresses A low system frequency sensor FSE is implemented to prevent the TOE from single stepping The sensor is tested by the user mode security life cont
49. aluation True Random Number Generator TOE Security Functions Control TOE Security Functionality Universal Asynchronous Receiver Transmitter User Mode STS User mode Security Life Control Watch Dog Timer eXtended Random Access Memory Triple DES Encryption Standard V0 5 Date 2010 06 10 Page 71 73 M7820 Infineon PUBLIC Security Target 12 Glossary Application Program Data Software which implements the actual TOE functionality provided for the user or the data required for that purpose Central Processing Unit Logic circuitry for digital information processing Chip Integrated Circuit Chip Identification Data Data stored in the EEPROM containing the chip type lot number including the production site die position on wafer and production week and data stored in the ROM containing the STS version number Chip Identification Mode Operational status phase of the TOE in which actions for identifying the individual chip by transmitting the Chip Identification Data take place Controller IC with integrated memory CPU and peripheral devices Crypto2304 T Cryptographic coprocessor for asymmetric cryptographic operations RSA Elliptic Curves Cyclic Redundancy Check Process for calculating checksums for error detection Electrically Erasable and Programmable Read Only Memory EEPROM Non volatile memory permitting electrical read and write operations End User Person in contact with a TOE who makes use of its
50. an perform EC operations on elliptic curve parameters with key lengths up to 533 bits Included in the evaluation are only operations with key length of 192 to 521 bits The SHA library provides the calculation of a hash value of freely chosen data input in the CPU The SHA library is delivered as object code and is in this way available for the user software This secure hash algorithm SHA 2 is intended to be used for signature generation verification and generic data integrity checks The use for keyed hash operations like HMAC or similar security critical operations involving keys is not subject of this TOE and requires specific security improvements and DPA analysis including the operating system which is not part of this TOE V0 5 Date 2010 06 10 Page 11 73 M7820 Infineon PUBLIC Security Target Note that this TOE can come with both cryptographic co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both ayptographic co processors blocked The blocking depends on the user s choice prior to the production of the hardware No accessibility of the deselected cryptographic co processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors The TOE can be delivered without a specific library In this case the TOE does not provide the Additional Specific Security Functionality R
51. asic internal transfer protection FPT ITT 1 Basic internal TSF data transfer protection FDP IFC 1 Subset information flow control FCS RNG 1 Quality metric for random numbers The Table 16 provides an overview about the augmented security functional requirements which are added additional to the TOE and defined in this ST All requirements are taken from Common Criteria Part 2 3 with the exception of the requirement FPT TST 2 which is defined in this ST completely FPT PHP 3 Resistance to physical attack Table 16 Augmented security functional requirements Security Functional Requirement FPT TST 2 Subset TOE security testing EDD ACC 1 Subset access control FDP ACF 1 Security attribute based access control FMT MSA 1 Management of security attributes FMT MSA 3 Static attribute initialisation FMT SMF 1 Specification of Management functions FCS COP 1 Cryptographic support FCS CKM 1 Cryptographic key management FDP SDI 1 Stored data integrity monitoring FDP SDI 2 Stored data integrity monitoring and action V0 5 Date 2010 06 10 Page 35 73 M7820 Infineon PUBLIC Security Target All assignments and selections of the security functional requirements of the TOE are done in PP 1 and in the following description The above marked extended components FMT_LIM 1 and FMT_LIM 2 are introduced in PP 1 to define the IT security functional requirements of the TOE as an additional fam
52. choice which interface is in use both are available V0 5 Date 2010 06 10 Page 9 73 M7820 Infineon PUBLIC Security Target Note 1 The above listed Chip Identifier Bytes show the TOE derivates with the belonging configuration as defined today Depending on the market demands new TOE derivates with new Chip Identifier Bytes can be added over time and may be subject of additional certification processes i e assurance continuity processes The blocking mechanism is also part of the evaluation Each new chip configuration receives an own Chip Identifier Byte End of note The TOE consists of the hardware part the firmware parts and the software parts The software parts are the crypto library RSA the crypto library EC and the crypto library SHA 24 provide some functionality via an API to the Smartcard Embedded Software The firmware parts are the RMS library the Service Algorithm Minimal SAM the STS firmware for test purpose see chapter 2 2 2 providing some functionality via an API to the Smartcard Embedded Software the Flash Loader for downloading user software to the NVM and the Mifare compatible software interface The STS is implemented in a separated Test ROM being part of the TOE The Smartcard Embedded Software i e the operating system and applications are not part of the TOE The TOE can be delivered including in free combinations or not including any of the functionality of the EC crypt
53. completely 4 1 Threats The threats are directed against the assets and or the security functions of the TOE For example certain attacks are only one step towards a disclosure of assets while others may directly lead to a compromise of the application security The more detailed description of specific attacks is given later on in the process d evaluation and certification An overview on attacks is given in PP 1 section 3 2 The threats to security are defined and described in PP 1 section 3 2 Table 7 Threats according PP 1 T Phys Manipulation Physical Manipulation T Phys Probing Physical Probing T Malfunction Malfunction due to Environmental Stress T Leak Forced Forced Information Leakage T Abuse Func Abuse of Functionality T RND Deficiency of Random Numbers T Leak Inherent Inherent Information Leakage 4 1 1 Additional Threat due to TOE specific Functionality The additional functionality of introducing sophisticated privilege levels and access control allows the secure separation between the operation system s and applications the secure downloading of applications after personalization and enables multitasking by separating memory areas and performing access controls between different applications Due to this additional functionality area based memory access control a new threat is introduced The Smartcard Embedded Software is responsible for its User Data according to the assumption Treatment of User
54. ction against Snooping SF_PMA Protection against Modification Attacks SF_PLA Protection against Logical Attacks SF_CS Cryptographic Support The following description of the Security Features is a complete representation of the TSF 8 1 SF_DPM Device Phase Management The life cycle of the TOE is split up in several phases Chip development and production phase 2 3 4 and final use phase 47 is a rough split up from TOE point of view These phases are implemented in the TOE as test mode phase 3 and user mode phase 4 7 In addition a chip identification mode exists which is active in all phases The chip identification data O Ildentification is stored in a in the not changeable configuration page area and non volatile memory In the same area further TOE configuration data is stored In addition user initialization data can be stored in the non volatile memory during the production phase as well During this first data programming the TOE is still in the secure environment and in Test Mode The covered security functional requirement is EAU SAS 1 Audit storage During start up of the TOE the decision for one of the various operation modes is taken dependent on phase identifiers The decision of accessing a certain mode is defined as phase entry protection The phases follow also a defined and protected sequence The sequence of the phases is protected by means of authentication The covered security functional requirements are FMT
55. ctional requirements FDP ITT 1 FDP IFC 1 FPT ITT 1 FPT PHP 3 FPT FLS 1 FRU FLT 2 FMT LIM 1 EMT LIM 2 ECS RNG 1 and EAU SAS 1 The dependence of security functional requirements for the security functional requirements FPT TST 2 FDP ACC 1 FDP ACF 1 EMT MSA 1 FMT MSA 3 FMT SMF 1 FCS COP 1 FCS CKM 1 FDP SDI 1 and FDP SDI 2 are defined in the following description V0 5 Date 2010 06 10 Page 52 73 Pen j M7820 te Infineon PUBLIC Security Target Table 19 Dependency for cryptographic operation requirement Fulfilled by security requirements Security Functional Requirement Dependencies o FCS CKM 1 FCS COP 1 DES FDP ITC 1 or FDP_ITC 2 if not ECS CKM 1 FCS CKM 4 FCS CKM 1 FCS COP 1 AES FDP ITC 1 or FDP ITC 2 if not FCS_CKM 1 FCS_CKM 4 FCS CKM 1 FCS COP 1 RSA FDP ITC 1 or FDP_ITC 2 if not FCS_CKM 1 FCS_CKM 4 FCS CKM 2 or FCS_COP 1 FCS CKM 4 FCS CKM 1 FOS_COP 1 ECDSA FDP_ITC 1 or FDP ITC 2 if not FCS_CKM 1 FCS CKM 4 FCS CKM 2 or FCS COP 1 FCS CKM 4 FCS CKM 1 FOS_COF VECDH EpP ITC 1 or FDP_ITC 2 if not FCS CKM 1 FCS_CKM 4 Yes see comment 3 Yes see comment 3 Yes see comment 3 Yes see comment 3 Yes see comment 3 Yes see comment 3 D o FCS CKM 1 RSA Yes see comment 3 Yes see comment 3 Yes see comment 3 FCS CKM 1 EC Yes see comment 3 Yes see comment 3 Yes see comment 3 FCS COP 1 SHA No dependencies see comment 4 Yes see comme
56. d is in this way available for the user software This secure hash algorithm SHA 2 is intended to be used for signature generation verification and generic data integrity checks The use for keyed hash operations like HMAC or similar security gt CRT Chinese Remainder Theorem V0 5 Date 2010 06 10 Page 18 73 M7820 Infineon PUBLIC Security Target critical operations involving keys is not subject of this TOE and requires specific security improvements and DPA analysis including the operating system which is not part of this TOE Note 2 The eryptographic libraries RSA EC and SHA 2 are delivery options Therefore the TOE may come with free combinations of or without these libraries In the case of coming without one or any combination of these libraries the TOE does not provide the Additional Specific Security Functionality Rivest Shamir Adleman Cryptography RSA and or Elliptic Curve Cryptography EC and or SHA 2 End of note 2 2 3 Interfaces of the TOE e The physical interface of the TOE to the external environment is the entire surface of the IC e The electrical interface of the TOE to the external environment is constituted by the pads of the chip particularly the contacted RES I O CLK lines and supply lines VCC and GND as well as by the contactless RF interface The contact based communication is according to ISO 7816 ETSI EMV e The HF interface radio frequency power and signal interface enables c
57. e Cycle Support ALC_CMC 4 Production support acceptance in PP 1 procedures and automation ALC_TAT 2 Compliance with implementation standards ASE_ECD 1 Extended components definition Security Target Evaluation ASE_INT 1 ST introduction ASE OBJ 2 Security objectives ASE_REQ 2 Derived security requirements Tests ATE_COV 2 in PP 1 ATE_FUN 1 Functional testing ATE_IND 2 Independent testing sample Vulnerability AVA_VAN S Advanced methodical vulnerability in PP 1 Assessment testing V0 5 Date 2010 06 10 Page 48 73 M7820 Infineon PUBLIC Security Target 7 2 1 Refinements Some refinements are taken unchanged from the PP 1 In some cases a clarification is necessary In Table 17 an overview is given where the refinement is done Two refinements from the PP 1 have to be discussed here in the Security Target as the assurance level is increased Life cycle support ALC_CMS The refinement from the PP 1 can be applied even at the chosen assurance level EAL 5 augmented with ALC_CMS 5 The assurance package ALC_CMS 4 is extended to ALC_CMS 5 with aspects regarding the configuration control system for the TOE The refinement is not touched Functional Specification ADV FSP The refinement from the PP 1 can be applied even at the chosen assurance level EAL 5 augmented with ADV FSP 5 The assurance package ADV FSP 4 is extended to ADV FSP 5 with aspects regarding the descriptive level The
58. ecurity V0 5 Date 2010 06 10 Page 21 73 M7820 Infineon PUBLIC Security Target 3 4 Conformance Rationale This security target claims strict conformance only to one PP the PP 1 The Target of Evaluation TOE is a typical security IC as defined in PP chapter 1 2 2 comprising e thecircuitry of the IC hardware including the physical memories e configuration data initialisation data related to the IC Dedicated Software and the behaviour of the security functionality e the IC Dedicated Software with the parts e the IC Dedicated Test Software e the IC Dedicated Support Software The TOE is designed produced and or generated by the TOE Manufacturer Security Problem Definition Following the PP 1 the security problem definition is enhanced by adding an additional threat an organization security policy and an augmented assumption Including these add ons the security problem definition of this security target is consistent with the statement of the security problem definition in the PP 1 as the security target claimed strict conformance to the PP 1 Conformance Rationale The augmented organizational security policy P Add Functions coming from the additional security functionality of the cryptographic libraries the augmented assumption A Key Function related to the usage of key depending function and the threat memory access violation T Mem Access due to specific TOE memory access control functio
59. ed Encryption Standard AES e Triple Data Encryption Standard 3DES e Rivest Shamir Adleman RSA e Elliptic Curve Cryptography EC e Secure Hash Algorithm SHA 2 Note 5 The cryptographic libraries RSA EC and SHA 2 are delivery options Therefore the TOE may come with free combinations of or without these libraries In the case of coming without one or any combination of these libraries the TOE does not provide the Additional Specific Security Functionality RivestShamir Adleman Cryptography RSA and or Elliptic Curve Cryptography EC V0 5 Date 2010 06 10 Page 29 73 pam oe M7820 Infineon PUBLIC Security Target and or SHA 2 End of note Note 6 This TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both aypto co processors blocked The blocking depends on the customer demands prior to the production of the hardware In case the SCP is blocked no AES and 3DES computation supported by hardware is possible In case the Crypto2304T is blocked no RSA and EC computation supported by hardware is possible The use of the SHA 2 library is also possible with both crypto coprocessors blocked No accessibility of the deselected cryptographic co processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors End of note The TOE shall provide Area
60. emory sizes and coprocessors are done during the manufacturing process depending on the customer order and are subject of the evaluation All resulting combinations of derivates are subject of the certificate The second part of this TOE includes the parts of the associated firmware and software required for operation and cryptographic support The documents as described in section 2 2 4 and listed in Table 1 are supplied as user guidance In the following description the term manufacturer is short for Infineon Technologies AG the manufacturer of the TOE The Smartcard Embedded Software respectively user software is not part of the TOE 2 2 1 Hardware of the TOE The hardware part of the TOE see Figure 1 as defined in 1 is comprised of Core System Proprietary CPU implementation of the Intel MCS251 standard architecture from functional perspective represented by two CPUs from hardware perspective Cache with Post Failure Detection V0 5 Date 2010 06 10 Page 16 73 M7820 Infineon PUBLIC Security Target Memory Encryption Decryption Unit MED and Error Detection Unit EDU Memory Management Unit MMU Memories Read Only Memory ROM Random Access Memory RAM Electrical Erasable Programmable Read Only Memory EEPROM EEPROM Flash memory Note that the TOE has only implemented an EEPROM Flash memory module parts of this memory module are configured to work as an EERPOM Peripherals True Random Number G
61. enerator TRNG Pseudo Random Number Generator PRNG Watchdog and Timers Universal Asynchronous Receiver Transmitter UART Checksum module CRC RF interface radio frequency power and signal interface Control Dynamic Power Management Internal Clock Oscillator ICO Interrupt and Peripheral Event Channel Controller ITP and PEC Interface Management Module IMM User mode Security Life Control UmSLC Voltage Regulator Coprocessors Crypto2304 T for asymmetric algorithms like RSA and EC optionally blocked Symmetric Crypto Co processor for 3DES and AES Standards optionally blocked Security Peripherals Filters Sensors Buses AXI Memory Bus APB Peripheral Bus V0 5 Date 2010 06 10 Page 17 73 M7820 Infineon PUBLIC Security Target 2 2 2 Firmware and software ofthe TOE The entire firmware ofthe TOE consists of different parts One part comprises the RMS and SAM routines for EEPROM programming security functions test and random number online testing Resource Management System IC Dedicated Support Software in PP 1 The RMS and SAM routines are stored from Infineon Technologies AG in a reserved area of the normal user ROM The second part is the STS consisting of test and initialization routines Self Test Software IC Dedicated Test Software in PP 1 The STS routines are stored in the especially protected test ROM and are not accessible for the user software The third part is the Flas
62. erform encryption and decryption in accordance with a specified cryptographic algorithm Rivest Shamir Adleman RSA and cryptographic key sizes 1024 4096 bits that meet the following standards Encryption According to section 5 1 1 RSAEP in PKCS v2 1 RFC3447 Without 5 1 1 1 Decryption with or without CRT According to section 5 1 2 RSADP in PKCS v2 1 RFC3447 V0 5 Date 2010 06 10 Page 42 73 M7820 Infineon PUBLIC Security Target for u 2 i e without any r_i d i t i i 52 therefore without 5 1 2 2 b ii amp v without 5 1 2 1 5 1 2 2 a only supported up to n lt 2 9 Signature Generation with or without CRT According to section 5 2 1 RSASP 1 in PKCS v2 1 RFC3447 for u 2 i e without any r_i d i t i 1 52 therefore without 5 2 1 2 b ii amp v without 5 2 1 1 5 2 1 2 a only supported up to n lt 2 9 Signature Verification According to section 5 2 2 HSAVP1 in PKCS v2 1 RFC3447 without 5 2 2 1 Rivest Shamir Adleman RSA key generation The key generation for the RSA shall meet the requirement Cryptographic key generation FCS CKM 1 FCS CKM 1 RSA Cryptographic key generation Hierarchical to No other components Dependencies FCS CKM 2 Cryptographic key distribution or FCS COP 1 Cryptographic operation FCS CKM 4 Cryptographic key destruction FMT MSA 2 Secure security attributes FCS CKM 1 1 RSA The TSF shall generate cryptographic keys in accordance with
63. es FDP ITC 1 Import of user data without security attributes or FDP ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction FCS COP 1 1 ECDSA The TSF shall perform signature generation and signature verification in accordance with a specified cryptographic algorithm ECDSA and cryptographic key sizes 192 521 bits that meet the following standard Signature Generation 1 According to section 7 3 in ANSI X9 62 2005 Not implemented is step d and e thereof The output of step e has to be provided as input to our function by the caller Deviation of step c and f The jumps to step a were substituted by a return of the function with an error code the jumps are emulated by another call to our function 2 According to sections 6 2 6 2 2 6 2 3 in ISO IEC 15946 2 2002 Not implemented is section 6 2 1 The output of 5 4 2 has to be provided by the caller as input to the function Signature Verification 1 According to section 7 4 1 in ANSI X9 62 2005 Not implemented is step b and c thereof The output of step c has to be provided as input to our function by the caller Deviation of step d Beside noted calculation our algorithm adds a random multiple of BasepointerOrder n to the calculated values u1 and u2 2 According to sections 6 4 6 4 1 6 4 3 6 4 4 in ISO IEC 15946 2 2002 Not implemented is section 6 4 2 The output of 5 4 2
64. es ee eT een ee er ser seele ee ne 40 7 1 5 PA WACO es A A ES ee re E A E AA A en ra AT 47 1 2 TOE SECURITY ASSURANCE REQUIREMENTS nun een rennen 48 7 2 1 PETET e ee ee 49 7 3 SECURITY REQUIREMENTS RATIONALE western nenne rennen een 49 7 3 1 Rationale for the Security Functional Requirements sss 49 f die Rationale of the Assurance Requirements esses essen nennen sanas nnns 55 8 TOE SUMMARY SPECIFICATION ASE_TSS u u0200002000nann0nunannunnn nun nn nun nn ann nn an nun nn nun nn nnne nnne 57 8 1 SF_DPM DEVICE PHASE MANAGEMENT eee 57 8 2 SF PS PROTECTION AGAINST SNOOPING 5245 ear aei sea aru sk anne nenne 58 8 3 SF PMA PROTECTION AGANST MODIFYING ATTACKS x x e e e eee 59 8 4 SF PLA PROTECTION AGAINST LOGICAL ATTACKS uucusscaussuassunanannsenennnn anna recae sanae Rank k aa kae Paca nn 61 8 5 SF CS CRYPTOGRAPHIC SUPPORT ssssssssessesesenee nenne e ne esee eese eese sse esse e sese sese si seni rens 61 8 5 1 E O 61 8 5 2 5 IcoM 62 8 5 3 xi REEE EET A EO E AEE E E A OA E AE P 62 8 5 4 2 EX 63 8 5 5 vr Lo 64 8 5 6 Iugc m 65 8 6 ASSIGNMENT OF
65. es of the TOE and their interface as specified When key dependent functions implemented in the Smartcard Embedded Software are just being executed the Smartcard Embedded Software must provide protection against disclosure of confidential data User Data stored and or processed in the TOE by using the methods described under Inherent Information Leakage T Leak Inherent and Forced Information Leakage T Leak Forced The objectives of the environment regarding the memory software and firmware protection and the SFR and peripheral access rights handling have to be clarified For the separation of different V0 5 Date 2010 06 10 Page 30 73 pam oe M7820 Infineon PUBLIC Security Target applications the Smartcard Embedded Software Operating System may implement a memory management scheme based upon security functions of the TOE 5 2 2 Clarification of Treatment of User Data OE Resp Appl Regarding the cryptographic services this objective of the environment has to be clarified By definition cipher or plain text data and cryptographic keys are User Data The Smartcard Embedded ooftware shall treat these data appropriately use only proper secret keys chosen from a large key space as input for the cryptographic function of the TOE and use keys and functions appropriately in order to ensure the strength of cryptographic operation This means that keys are treated as confidential as soon as they are generated The keys must be u
66. ese libraries In the case of coming without one or any combination of these libraries the TOE does not provide the Additional Specific Security Functionality Rivest Shamir Adleman Cryptography RSA and or Elliptic Curve Cryptography EC and or SHA 2 End of note Note 21 This TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both aypto co processors blocked The blocking depends on the customer demands prior to the production of the hardware In case the SCP is blocked no AES and 3DES computation supported by hardware is possible In case the Crypto2304T is blocked no RSA and EC computation supported by hardware is possible The use of the SHA 2 library is also possible with both crypto coprocessors blocked No accessibility of the deselected cryptographic CO processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors End of note 8 6 Assignment of Security Functional Requirements to TOE s Security Functionality The justification and overview of the mapping between security functional requirements SFR and the TOE s security functionality SF is given in sections the sections above The results are shown in Table 20 The security functional requirements are addressed by at least one relating security feature The various functional requirements are
67. f Commerce National Bureau of Standards Secure Hash Algorithm FIPS PUB 180 3 2008 October section 6 2 SHA 256 and section 6 4 SHA 512 Note that the SHA 2 cryptographic operation is a keyless operation In case of a blocked Crypto2304T no cryptographic libraries are delivered Note 16 The TOE can be delivered without the SHA 2 library In this case the TOE does not provide the Additional Specific Security Functionality SHA 2 library realised with the security functional requirements FCS COP 1 SHA End of note Note 17 The secure hash algorithm SHA 2 is intended to be used for signature generation verification and V0 5 Date 2010 06 10 Page 46 73 M7820 Infineon PUBLIC Security Target generic data integrity checks The use for keyed hash operations like HMAC or similar security critical operations involving keys is not subject of this TOE and requires specific security improvements and DPA analysis including the operating system which is not part of this TOE 7 1 5 Data Integrity The TOE shall meet the requirement Stored data integrity monitoring FDP SDI 1 as specified below FDP SDI 1 otored data integrity monitoring Hierarchical to No other components Dependencies No dependencies FDP SDI 1 1 The TSF shall monitor user data stored in containers controlled by the TSF for inconsistencies between stored data and corresponding EDC on all objects based on the following attributes EDC value
68. f the Smartcard Embedded Software In contrast to this the threats T Leak Inherent and T Leak Forced address i the cryptographic routines which are part ofthe TOE For details see PP 1 section 3 4 V0 5 Date 2010 06 10 Page 28 73 pam oe M7820 Infineon PUBLIC Security Target 5 Security objectives ASE OBJ This section shows the subjects and objects where are relevant to the TOE A short overview is given in the following The user has the following standard high level security goals related to the assets e G1 maintain the integrity of User Data and of the Security IC Embedded Software e G2 maintain the confidentiality of User Data and of the Security IC Embedded Software e G3 maintain the correct operation of the security services provided by the TOE for the Security IC Embedded Software e SG4 provision of random numbers 5 1 Security objectives for the TOE The security objectives of the TOE are defined and described in PP 1 section 4 1 Table 11 Objectives for the TOE according to PP 1 Protection against Physical Probing O Abuse Func Protection against Abuse of Functionality O Identification TOE Identification O RND Random Numbers The TOE provides Additional Specific Security Functionality O Add Functions as specified below O Add Functions Additional Specific Security Functionality The TOE must provide the following specific security functionality to the Smartcard Embedded Software e Advanc
69. h Loader a piece of software located in the user ROM and allowing downloading the user software or parts of it to the EEPROM flash memory After completion of the download the Flash Loader can be permanently deactivated by the user The fourth part is the Mifare M compatible Interface routines which call the RMS routines if active Note that the Mifare compatible Interface portion is always present but deactivated in case of the non Mifare compatible Interface derivates Thus the user interface is identically in both cases and subsequently the Mifare compatible Interface routines can be called in each of the derivates In case Mifare M compatible Interface routines are called in derivates without Mifare V compatible Interface a dedicated error code is returned and in case of the Mifare compatible Interface derivate the according function is performed All parts of the firmware above are combined together by the ROM flow to a single file and stored then in the data files the ROM mask is produced from The optional software part of the TOE consists of the RSA the EC and the SHA 2 library The RSA library is used to provide a high level interface to the RSA cryptography implemented on the hardware component Crypto2304T and includes countermeasures against SPA DPA and DFA attacks The routines are used for the generation of RSA Key Pairs RsaKeyGen the RSA signature verification RsaVerify the RSA signature generation RsaSign and the
70. has to be provided by the caller as input to the function Note 11 For easy integration of EC functions into the user s operating system and or application the library contains single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note V0 5 Date 2010 06 10 Page 44 73 M7820 Infineon PUBLIC Security Target Elliptic Curve EC key generation The key generation for the EC shall meet the requirement Cryptographic key generation FCS_CKM 1 FCS_CKM 1 EC Cryptographic key generation Hierarchical to No other components Dependencies FCS_CKM 2 Cryptographic key distribution or FCS_COP 1 Cryptographic operation FCS CKM 4 Cryptographic key destruction FCS CKM 1 1 EC The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm Elliptic Curve EC specified in ANSI X9 62 2005 and ISO IEC 15946 1 2002 and specified cryptographic key sizes 192 521 bits that meet the following standard ECDSA Key Generation 1 According to the appendix A4 3 in ANSI X9 62 2005 the cofactor h is not supported 2 According to section 6 1 not 6 1 1 in ISO IEC 15946 1 2002 Note 12 For easy integration of EC functions into the user s operating system and or application the library contai
71. he Intel 80251 architecture The major components of the core system are the two CPUs Central Processing Units the MMU Memory Management Unit and MED Memory Encryption Decryption Unit The two CPUs control each other in order to detect faults and serve by this for data integrity The TOE implements a full 16 MByte linear addressable memory space for each privilege level a simple scalable Memory Management concept and a scalable stack size The flexible memory concept consists of ROM and Flash memory as part of the non volatile memory NVM respectively EEPROM For the EEPROM memory the Unified Channel Programming UCP memory technology is used The RMS library providing some functionality via an API to the Smartcard Embedded Software contains for example EEPROM service routines The Service Algorithm provides functionality for the tearing save write into the EEPROM The STS firmware is used for test purposes during start up and the Flash Loader allows downloading user software to the NVM during the manufacturing process The STS is implemented in a separated Test ROM being part of the TOE The two cryptographic co processors serve the need of modern cryptography The symmetric co processor SCP combines both AES and Triple DES with dual key or triple key hardware acceleration The Asymmetric Crypto Co processor called Crypto2304T in the following is an optimized version of the Crypto 1408 used in the SLE88 family with performance improvemen
72. he objectives for the environment OE Plat Appl and OE Resp Appl have been clarified The Smartcard Embedded Software defines the use of the cryptographic functions FCS COP 1 provided by the TOE The requirements for the environment FDP ITC 1 FDP ITC 2 FCS CKM 1 and FCS CKM 4 support an appropriate key management These security requirements are suitable to meet OE Resp Appl The justification of the security objective and the additional requirements both for the TOE and its environment show that they do not contradict to the rationale already given in the Protection Profile for the assumptions policy and threats defined there The security functional component Subset TOE security testing FPT TST 2 has been newly created Common Criteria Part 2 extended This component allows that particular parts of the security mechanisms and functions provided by the TOE can be tested after TOE Delivery This security functional component is used instead of the functional component FPT TST 1 from Common Criteria Part 2 For the user it is important to know which security functions or mechanisms can be tested The functional component FPT TST 1 does not mandate to explicitly specify the security functions being tested In addition FPT TST 1 requires verification of the integrity of TSF data and stored TSF executable code which might violate the security policy The tested security enforcing functions are SF DPM Device Phase Management SF CS Cryptographic Su
73. ide the Additional Specific Security Functionality Rivest Shamir Adleman Cryptography RSA and or Elliptic Curve Cryptography EC and or SHA 2 In case of a blocked Crypto2304T no asymmetric cryptographic libraries are delivered The SHA 2 library is computed in the CPUs Therefore the IT environment has to fulfil the requirements of this chapter depending if the TOE comes with or without a the library ies In case of a blocked Crypto2304T no cryptographic libraries are delivered End of Comment Comment 4 The dependencies FCS CKM 1 and FMT CKM 4 are not required for the SHA 2 algorithm because the SHA 2 algorithm is a keyless operation So the environment is not obligated to meet certain requirements for key management End of comment 7 3 2 Rationale of the Assurance Requirements The chosen assurance level EAL5 and the augmentation with the requirements ALC DVS 2 and AVA VAN 5 were chosen in order to meet the assurance expectations explained in the following paragraphs In Table 17 the different assurance levels are shown as well as the augmentations The augmentations are in compliance with the Protection Profile An assurance level EAL5 with the augmentations ALC_DVS 2 and AVA VAN 5 are required for this type of TOE since it is intended to defend against highly sophisticated attacks without protective environment This evaluation assurance package was selected to permit a developer to gain maximum assurance from positive security enginee
74. ily FMT LIM of the Class FMT Security Management This family describes the functional requirements for the Test Features of the TOE The new functional requirements were defined in the class FMT because this class addresses the management of functions of the TSF The additional component FAU SAS is introduced to define the security functional requirements of the TOE of the Class FAU Security Audit This family describes the functional requirements for the storage of audit data and is described in the next chapter The requirement FPT_TST 2 is the subset of TOE testing and originated in 3 This requirement is given as the correct operation of the security functions is essential The TOE provides mechanisms to cover this requirement by the smartcard embedded software and or by the TOE itself 7 1 4 Extended Components FCS RNG 1 and FAU SAS 1 7 1 1 1 FCS RNG To define the IT security functional requirements of the TOE an additional family FCS RNG of the Class FCS cryptographic support is defined here This family describes the functional requirements for random number generation used for cryptographic purposes FCS RNG 1 Random Number Generation Hierarchical to No other components Dependencies No dependencies FCS _RNG 1 Generation of random numbers requires that random numbers meet a defined quality metric FCS_RNG 1 1 The TSF shall provide a physical random number generator that implements total failure test of the random s
75. is security functional component is used instead of the functional component FPT TST 1 from Common Criteria Part 2 For the user it is important to know which security functions or mechanisms can be tested The functional component FPT TST 1 does not mandate to explicitly specify the security functions being tested In addition FPT TST 1 requires verifying the integrity of TSF data and stored TSF executable code which might violate the security policy The functional component Subset TOE testing FPT TST 2 is specified as follows Common Criteria Part 2 extended V0 5 Date 2010 06 10 Page 33 73 M7820 Infineon PUBLIC Security Target 6 3 TSF self test FPT TST Family Behavior The Family Behavior is defined in 3 section 15 14 442 443 Component levelling FPT TST TSF self test FPT_TST 1 The component FPT TST 1 is defined in 3 section 15 14 444 445 446 FPT TST 2 Subset TOE security esting provides the ability to test the correct cperation of particular security functions or mechanisms These tests may be performed at start up periodically at the request of the authorized user or when other conditions are met It also provides the ability to verify the integrity of TSF data and executable code Management FPT TST 2 The following actions could be considered for the management functions in FMT e management of the conditions under which subset TSF self testing occurs such as during initial
76. ivest Shamir Adleman Cryptography RSA or and Elliptic Curve Cryptography EC or and SHA 2 To fulfil the highest security standards for smartcards today and also in the future this TOE represents an entirely new security concept This TOE utilizes digital security features to include customer friendly security combined with a robust design overcoming the disadvantages on analogue protection technologies The TOE provides full on chip encryption covering the complete core busses memories and cryptographic co processors leaving no plaintext on the chip Therefore the attractiveness for attackers is extremely reduced as encrypted signals are of no use for the attacker neither for manipulation nor for eavesdropping In addition the TOE is equipped with a full error detection capability for the complete data path The dual CPU approach allows error detection even while processing A comparator detects whether a calculation was performed without errors This approach does not leave any parts of the circuitry unprotected The concept allows that the relevant attack scenarios are detected whereas other conditions that would not lead to an error would mainly be ignored And more the TOE is equipped with signal protection implemented by an Infineon specific shielding combined with secure wiring of security critical signals Subsequently an intelligent shielding algorithm finishes the upper layers finally providing the so called F shield In this
77. lications Various options can be chosen by the user to implement his software during production providing a maximum of flexibility Table 2 Options to implement user software at Infineon production premises The user provides software for the download into the EEPROM flash memory to Infineon Technologies AG The software is downloaded to the EEPROM flash memory during chip production l e there are no user data in the ROM The user or and a subcontractor downloads the software into the EEPROM flash memory on his own Infineon Technologies has not received user software and there are no user data in the ROM The user provides the software implementation into the ROM mask The FL is blocked afterwards but can be activated or reactivated by the user or subcontractor to download his software in the EEPROM flash memory Precondition is that the user has provided an own reactivation procedure in software prior chip production to Infineon Technologies AG The FL can be activated or reactivated by the user or subcontractor to download his software in the EEPROM flash memory or There is no FL present Within its physical limits various configuration can occur which are and will all be equal from hardware perspective Anyhow the user must be able to clearly identify whether a certain product is covered by a certificate or not Date 2010 06 10 Page 7 73 M7820 Infineon PUBLIC Security Target The followi
78. lishes the clear separation of different restricted memory areas for running the firmware downloading and or running the operating system and to establish a clear separation between different applications Nevertheless it is also possible to define a shared memory section where separated applications may exchange defined data The privilege levels clearly define by using a hierarchical model the access right from one level to the other These measures ensure that the threat T Mem Access is clearly covered by the security objective O Mem Access The justification of the additional policy ad the additional assumption show that they do not contradict to the rationale already given in the Protection Profile for the assumptions policy and threats defined there V0 5 Date 2010 06 10 Page 32 73 M7820 Infineon PUBLIC Security Target 6 Extended Component Definition ASE_ECD There are four extended components defined and described for the TOE e the family FCS_RNG at the class FCS Cryptographic Support e the family FMT LIM at the class FMT Security Management e the family FAU SAS at the class FAU Security Audit e the component FPT TST 2 at the class FPT Protection of the TSF The extended components ECS RNG EMT LIM and EAU SAS are defined and described in PP 1 section 5 The component FPT_TST 2 is defined in the following 6 1 Component Subset TOE security testing FPT TST The security is strongly dependent on the co
79. n of management functions FMT SMHR 1 Security roles FMT MSA 1 1 The TSF shall enforce the Memory Access Control Policy to restrict the ability to change default modify or delete the security attributes permission control information to the software running on the privilege levels The TOE shall meet the requirement Specification of management functions FMT_SMF 1 as specified below FMT SMF 1 opecification of management functions Hierarchical to No other components Dependencies No dependencies FMI SMF 1 1 The TSF shall be capable of performing the following security Pr nat functions access the configuration registers of the 7 1 4 Support of Cipher Schemes The following additional specific security functionality is implemented in the TOE FCS COP 1 Cryptographic operation requires a cryptographic operation to be performed in accordance with a specified algorithm and with a cryptographic key of specified sizes The 7 The static definition of the access rules is documented in 7 8 The Smartcard Embedded Software is intended to set the memory access control policy V0 5 Date 2010 06 10 Page 40 73 M7820 Infineon PUBLIC Security Target specified algorithm and cryptographic key sizes can be based on an assigned standard dependencies are discussed in Section 7 3 1 1 The following additional specific security functionality is implemented in the TOE e Advanced Encryption Standard AES e Triple Data Encr
80. nagement of security attributes FMT SMF 1 Specification of Management Functions O Malfunction FDP_SDI 1 Stored data integrity monitoring FDP SDI 2 Stored data integrity monitoring and action The table above gives an overview how the security functional requirements are combined to meet the security objectives The detailed justification is given in the following The justification related to the security objective Additional Specific Security Functionality O Add Functions is as follows The security functional requirement s Cryptographic operation FCS COP 1 exactly requires those functions to be implemented which are demanded by O Add Functions FCS CKM 1 RSA supports the generation of RSA keys the FCS CKM 1 EC supports the generation of EC keys needed for this cryptographic operations Therefore ECS COP 1 RSA FCS COP 1 ECDSA FCS COP 1 ECDH and FCS CKM 1 RSA and FCS CKM EC are suitable to meet the security objective The FCS_COP 1 SHA is a keyless algorithm and has no dependencies to FCS_CKM 1 Nevertheless the developer of the Smartcard Embedded Software must ensure that the additional functions are used as specified and that the User Data processed by these functions are protected as defined for the application context These issues are addressed by the specific security functional requirements e FDP_ITC 1 Import of user data without security attributes or FDP_ITC 2 Import of user data with security attribu
81. nality have been added These add ons have no impact on the conformance statements regarding CC 2 and PP 1 with following rational e The security target remains conformant to CC 2 claim 482 as the possibility to introduce additional restrictions is given e he security target fulfils the strict conformance claim of the PP 1 due to the application notes 5 6 and 7 which apply here By those notes the addition of further security functions and security services are covered even without deriving particular security functionality from a threat but from a policy Due to additional security functionality one coming from the cryptographic libraries O Add Functions and due to the memory access control O Mem Access additional security objectives have been introduced These add ons have no impact on the conformance statements regarding CC 2 and PP 1 with following rational e The security target remains conformant to CC 2 claim 482 as the possibility to introduce additional restrictions is given e The security target fulfils the strict conformance of the PP 1 due to the application note 9 applying here This note allows the definition of high level security goals due to further functions or services provided to the Security IC Embedded Software Therefore the security objectives of this security target are consistent with the statement of the security objectives in the PP 1 as the security target claimed strict conforma
82. nce to the PP 1 All security functional requirements defined in the PP 1 are included and completely defined in this ST The security functional requirements listed in the following are all taken from Common Criteria part 2 3 and additionally included and completely defined in this ST e FDP ACC 1 Subset access control e FDP ACF 1 Security attribute based access control e FMT_MSA 1 Management of security attributes V0 5 Date 2010 06 10 Page 22 73 M7820 Infineon PUBLIC Security Target e FMT MSA 3 Static attribute initialisation e FMI SMF 1 Specification of Management functions e FCS COP Cryptographic support e FCS CKM 1 Cryptographic key generation e FDP_SDI 1 Stored data integrity monitoring e FDP_SDI 2 Stored data integrity monitoring and action The security functional requirement e FPT TST 2 Subset TOE security testing Requirement from 3 is included and completely defined in this ST section 6 All assignments and selections of the security functional requirements are done in the PP 1 and in this security target in section 7 2 The Assurance Requirements of the TOE obtain the Evaluation Assurance Level 5 augmented with the assurance components ALC_DVS 2 and AVA VAN 5 for the TOE V0 5 Date 2010 06 10 Page 23 73 pam oe M7820 Infineon PUBLIC Security Target 4 Security Problem Definition ASE_SPD The content of the PP 1 applies to this chapter
83. ng table contains memory size regions and other blocking options within the configuration can vary under only one development code the M7820 Table 3 Basic Configurations of the TOE Interfaces Code Crypto configurable by Name NVM ROM XRAM SCP 2304T the user ISO 7816 ISO IEC 14443 i 1 upto upto Mifare wen deo 20 oiae amaes orones mpatie kByte kByte y Interface FELICA ISO IEC18092 Passive mode User availability depends on blocking Beside these flexible ranges the user guidance contains a number of predefined products with different configurations All of these are labelled wth M7820 and are of course made of the equal hardware and belong to this TOE as well Today s configurations of the TOE are listed below These predefined products come with the most requested configurations and allow to produce volumes on stock in order to simplify logistic processes Note that any hardware configuration comes with its own chip identifier byte as shown in the table below The chip identifier bytes are aimed to be used for simplification of the logistical processes but are available to the user as well For the user s clear TOE identification the Chipldent contains the relevant data which clearly can be mapped to a product of the TOE in a dedicated configuration The hardware reference manual 7 allows the clear interpretation of the read out Chipldent data In addition a dedicated RMS functi
84. nique with a very high probability as well as cryptographically strong For example it must be ensured that it is beyond practicality to derive the private key from a public key if asymmetric algorithms are used If keys are imported into the TOE and or derived from other keys quality and confidentiality must be maintained This implies that appropriate key management has to be realised in the environment Regarding the memory software and firmware protection and the SFR and peripheral access rights handling these objectives of the environment has to be clarified The treatment of User Data is also required when a multi application operating system is implemented as part of the Smartcard Embedded Software on the TOE In this case the multi application operating system should not disclose security relevant user data of one application to another application when it is processed or stored on the TOE 5 2 3 Clarification of Protection during Composite product manufacturing OE Process Sec IC The protection during packaging finishing and personalization includes also the personalization process Flash Loader software and the personalization data TOE software components during Phase 4 Phase 5 and Phase 6 5 3 Security Objectives Rationale The security objectives rationale of the TOE are defined and described in PP 1 section 4 4 For organizational security policy P Add Functions OE Plat Appl and OE Resp Appl the rationale is given in the
85. ns single cryptographic functions respectively primitives which are compliant to the standard The primitives are referenced above Therefore the library supports the user to develop an application representing the standard if required End of note Elliptic Curve Diffie Hellman ECDH key agreement The Modular Arithmetic Operation of the TOE shall meet the requirement Cryptographic operation ECS COP 1 as specified below FCS COP 1 ECDH Cryptographic operation Hierarchical to No other components Dependencies FDP ITC 1 Import of user data without security attributes or FDP ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction FCS COP 1 1 ECDH The TSF shall perform elliptic curve Diffie Hellman key agreement in accordance with a specified cryptographic algorithm ECDH and cryptographic key sizes 192 521 bits that meet the following standard 1 According to section 5 4 1 in ANSI X9 63 2001 Unlike section 5 4 1 3 our implementation not only returns the x coordinate of the shared secret but rather the x coordinate and y coorainate V0 5 Date 2010 06 10 Page 45 73 M7820 Infineon PUBLIC Security Target 2 According to sections 8 4 2 1 8 4 2 2 8 4 2 3 and 8 4 2 4 in ISO IEC 15946 3 2002 The function enables the operations described in the four sections Note 13 For easy integration of EC functions into the user s
86. nt O Phys Probing O Malfunction O Phys Manipulation and O Leak Forced also protect the area based memory access control function implemented according to the security functional requirement described in the security functional requirement EDD ACOC 1 with reference to the Memory Access Control Policy and details given in FDP ACF 1 Therefore those security functional requirements support the secure implementation and operation of EDD ACF 1 with its dependent security functional requirements The requirement FDP SDI 2 1 allows detection of integrity errors of data stored in memory FDP SDI 2 2 in addition allows correction of one bit errors or taking further action Both meet the security objective O Malfunction The requirements FRU FLT 2 FPT FLS 1 and FDP_ACC 1 which also meet this objective are independent from FDP SDI 2 since they deal with the observation of the correct operation of the TOE and not with the memory content directly V0 5 Date 2010 06 10 Page 67 73 M7820 Infineon PUBLIC Security Target 9 References 9 1 Literature 1 2 3 4 5 6 7 11 12 13 Security IC Platform Protection Profile Version 1 0 15 06 2007 BSI PP 0035 Common Criteria for Information Technology Security Evaluation Part 1 Introduction and General Model Version 3 1 Revision 3 July 2009 CCMB 2009 07 001 Common Criteria for Information Technology Security Evaluation Part 2 Security Functional Re
87. nt 3 FPT TST 2 FDP ACC FPT AMT FDP_ACF 1 FDP ACC EMT MSA 3 FMT MSA 1 Yes FMT_SMR 1 Not required see comment 2 Yes see comment 1 D o Yes FDP ACF 1 vos EMT MSA 2 FDP_ACC 1 or FDP_IFC 1 Yes FMT SMH 1 see comment 2 FMT_SMF 1 Yes None N A None N A None N A EMT MSA FMT_SMF 1 FDP_SDI 1 FDP_SDI 2 V0 5 Date 2010 06 10 Page 53 73 M7820 Infineon PUBLIC Security Target Comment 1 The following discussion demonstrates how the dependencies defined by Part 2 of the Common Criteria for the requirement FPT TST 2 are satisfied The dependency of FPT TST 1 defined in section 6 2 of this Security Target is FPT AMT 1 Abstract machine testing Part 2 of the Common Criteria explains that the term underlying abstract machine typically refers to the hardware components upon which the TSF has been implemented However the phrase can also be used to refer to an underlying previously evaluated hardware and software combination behaving as a virtual machine upon which the TSF relies The TOE is already a platform representing the lowest level in a Smartcard There is no lower or underlying abstract machine used by the TOE which can be tested There is no need to perform testing according to FPT AMT 1 and the dependency in the requirement FPT TST 2 is therefore considered to be satisfied End of Comment Comment 2 The dependency FMT_SMR 1 introduced by the two components FM
88. often covered manifold As described above the requirements ensure that the TOE is checked for correct operating conditions and if a not correctable failure occurs that a stored secure state is achieved accompanied by data integrity monitoring and actions to maintain the integrity although failures occurred An overview is given in following table V0 5 Date 2010 06 10 Page 65 73 Per j M7820 2 Infi n eon PUBLIC Security Target Table 20 Mapping of SFR and SF SF PLA SF CS Requirement FAU SAS 1 FMT LIM 1 FMT LIM 2 FDP ACC 1 FDP ACF 1 FPT PHP 3 FDP ITT 1 FDP SDI 1 FDP SDI 2 FDP IFC 1 FMT MSA 1 FMT MSA 3 FMT SMF 1 FRU FLT 2 FPT ITT 1 FPT TST 2 FPT FLS 1 FCS_RNG 1 FCS_COP 1 DES FCS COP 1 AES FCS COP 1 RSA FCS COP 1 ECDSA FCS COP 1 ECDH FCS COP 1 SHA FCS CKM 1 RSA FCS CKM 1 EC U D O S c 5 2 5 I V0 5 Date 2010 06 10 Page 66 73 M7820 Infineon PUBLIC Security Target 8 7 Security Requirements are internally Consistent For this chapter the PP 1 section 6 3 4 can be applied completely In addition to the discussion in section 6 3 of PP 1 the security functional requirement FCS COP 1 is introduced The security functional requirements required to meet the security objectives O Leak Inherent O Phys Probing O Malfunction O Phys Manipulation and O Leak Forced also protect the cryptographic algorithms implemented according to the security functional
89. ographic library the RSA cryptographic library and the SHA 2 cryptographic library If the user decides not to use one or all of the crypto library s the specific library s is are not delivered to the user and the accompanying Additional Specific Security Functionality O Add Functions Rivest Shamir Adleman RSA and or EC and or SHA 2 is are not provided by the TOE Deselecting one of the libraries does not include the code implementing functionality which the user decided not to use Not including the code of the deselected functionality has no impact of any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the functionality The RSA EC and SHA 2 libraries can be implemented together with the Smartcard Embedded Software in the User ROM mask or respectively loaded into the EEPROM All other Smartcard Embedded Software does not belong to the TOE and is not subject of the evaluation 1 2 Target of Evaluation overview The TOE comprises the Infineon Technologies Smart Card IC Security Dual Interface Controller M7820 with specific IC dedicated software and optional RSA EC and SHA 2 libraries This Security Target ST describes the TOE known as the Infineon Technologies AG security controller group as listed in Table 3 and gives a summary product description The TOE is a member of the Security Dual Interface Controller family SLE70 and meets the highest requirements
90. on allows reading out the present configuration of a given M7820 derivative which also allows for clear identification of a certain configuration with the help of the hardware reference manual 7 1 Mifare is a trademark of NXP B V V0 5 Date 2010 06 10 Page 8 73 pens ER M7820 Infi n eon PUBLIC Security Target Table 4 Today s defined configuration derivatives of the M7820 i i TM Product EN a ti ter bape E Code Byte Sales Name kBytes kBytes 7816 2 14443 Interface Passive mode Les wm ma va m os ee wes x p wewowam xD we oO wes xw wemceews wc ow we Ye v wes ws se w m s ve wes xw Eaa wo ow s we Ye wes s semrews ww m ve ve m wes ww ww a a s we Ye wes ww RH om s we Ye wes ww sewum w ww s w ve me wp xesme m pm o3 9 en wes s wewowew w mm s we ve wes x sewumm w me s w ve wes mw sewoweww w ze s we ve wes 0 w 5 9 v wes ww seme w ww s w ve wes sw n w om s we ve wes sm sewoww mw s w wes m wewosww w 5 5 ve ve Yw wes sw Se w o s we Ye v 1 Depicts the size of user available memory which is defined by blocking 2 If both are yes it is user s
91. ontactless communication between a PICC proximity integration chip card PICC and a PCD reader writer proximity coupling device PCD Power supply is received and data are received or transmitted by an antenna which consists of a coil with a few turns directly connected to the IC Depending on customer orders the contactless interface options are set by means of blocking and delivered as depicted in Table 4 Today s defined configuration derivatives of the M7820 e The data oriented I O interface to the TOE is formed by the I O pad and by the various RF options e The interface to the firmware is constituted by special registers used for hardware configuration and control Special Function Registers SFR e The interface of the TOE to the operating system is constituted on one hand by the RMS routine calls and on the other by the instruction set of the TOE e The interface of the TOE to the test routines is formed by the STS test routine call i e entry to test mode STS TM entry e The interface to the RSA calculations is defined from the RSA library interface e The interface to the EC calculations is defined from the EC library interface e The interface to the SHA 2 calculation is defined from the SHA 2 library interface Note that the interfaces to the cryptographic libraries RSA EC and SHA 2 are optionally depending on the customer order 2 2 4 Guidance documentation The guidance documentation consists of the SLE70 Family
92. ontrol FDP ACF 1 Security attribute based access control FMT_MSA 3 Static attribute initialization EMT MSA 1 Management of security attributes and FMT SMF 1 Specification of Management functions The TOE provides the possibility to protect the property rights of user code and data by the encryption of the EEPROM memory areas with a specific key defined by the user Due to this key management FDP ACF 1 is fulfilled In addition all memories present on the TOE are individually encrypted using individual keys assigned by complex key management All data are protected by means of encryption or masking also during transportation via the busses Induced errors are recognized by the Integrity Guard concept and lead to an alarm In case of security critical errors a security alarm is generated and the TOE ends up in a secure state The covered security functional requirements are CDT PHP 3 FDP ITT 1 FDP IFC 1 and FPT FLS 1 Beside the access protection and key management also the use of illegal operation code is detected and will release a security reset The SF PLA Protection against Logical Attacks covers the security functional requirements FDP ACC 1 FDP ACF 1 FMT MSA 1 FMT_MSA 3 FPT PHP 3 FDP ITT 1 FDP IFC 1 FPT FLS 1 and FMT SMF 1 8 5 SF CS Cryptographic Support The TOE is equipped with several hardware accelerators and software modules to support the standard symmetric and asymmetric cryptographic operations This sec
93. ontrol Hierarchical to No other components Dependencies FDP ACF 1 Security attribute based access control FDP_ACC 1 1 The TSF shall enforce the Memory Access Control Policy on all subjects software running at the defined and assigned privilege levels all objects data including code stored in memories and all the operations defined in the Memory Access Control Policy i e privilege levels The TOE shall meet the requirement Security attribute based access control FDP_ACF 1 as specified below FDP ACF 1 Security attribute based access control Hierarchical to No other components Dependencies FDP_ACC 1 Subset access control FMT_MSA 3 Static attribute initialisation FDP_ACF 1 1 The TSF shall enforce the Memory Access Control Policy to objects based on the following Subject Software running at the IFX OST and OS2 privilege levels required to securely operate the chip This includes also privilege levels running interrupt routines Software running at the privilege levels containing the application software Object data including code stored in memories Attributes the memory area where the access is performed to and or the operation to be performed FDP ACF 1 2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed evaluate the corresponding permission control information of the relevant memory range before during or after
94. ool to implement the policy defined in the context of the application The justification related to the security objective Protection against Malfunction due to Environmental Stress O Malfunction is as follows The security functional requirement Stored data integrity monitoring FDP_SDI 1 requires the implementation of an Error Detection EDC algorithm which detects integrity errors of the data stored in all memories By this the malfunction of the TOE using corrupt data is prevented Therefore FDP SDI 1 is suitable to meet the security objective V0 5 Date 2010 06 10 Page 51 73 M7820 Infineon PUBLIC Security Target The security functional requirement Stored data integrity monitoring and action FDP SDI 2 requires the implementation of an integrity observation and correction which is implemented by the Error Detection EDC and Error Correction ECC measures The EDC is present throughout all memories of the TOE while the ECC is realized in the EEPROM These measures detect and inform about one and more bit errors In case of the EEPROM 1 bit errors of the data are corrected automatically By the ECC mechanisms it is prevented that the TOE uses corrupt data Therefore FDP SDI 2 is suitable to meet the security objective 7 3 1 1 Dependencies of Security Functional Requirements The dependence of security functional requirements are defined and described in PP 1 section 6 3 2 for the following security fun
95. ource and a continuous RNG test according to National Institute of Standards and Technology Security Requirements for Cryptographic Modules Federal Information Processing Standards Publication FIPS 140 2 1999 FCS_RNG 1 2 The TSF shall provide random numbers that meet the functionality class P2 with SOF high of 6 7 1 1 2 FAU_SAS To define the security functional requirements of the TOE an additional family FAU_SAS of the Class FAU Security Audit is defined here This family describes the functional requirements for the storage of audit data It has a more general approach than FAU GEN because it does not necessarily require the data to be generated by the TOE itself and because it does not give specific details of the content of the audit records The TOE shall meet the requirement Audit storage FAU SAS 1 as specified below Common Criteria Part 2 extended FAU SAS 1 Audit Storage V0 5 Date 2010 06 10 Page 36 73 M7820 Infineon PUBLIC Security Target Hierarchical to No dependencies Dependencies No dependencies FAU SAS 1 1 The TSF shall provide the test process before TOE Delivery with the capability to store the Initialization Data and or Pre personalization Data and or supplements of the Security IC Embedded Software in the not changeable configuration page area and non volatile memory 7 1 2 Subset of TOE testing The security is strongly dependent on the correct operation of the sec
96. pport and SF PMA Protection against modifying attacks The security functional requirement FPT TST 2 will detect attempts to conduce a physical manipulation on the monitoring functions of the TOE The objective of FPT TST 2 is O Phys Manipulation The physical manipulation will be tried to overcome security enforcing functions The security functional requirement Subset access control FDP ACC 1 with the related Security Function Policy SFP Memory Access Control Policy exactly require the implementation of an area based memory access control as required by O Mem Access The related TOE security functional requirements FDP ACC 1 EDD ACF 1 FMT_MSA 3 EMT MSA 1 and EMT SMF 1 cover this security objective The implementation of these functional requirements is represented by the dedicated privilege level concept The justification of the security objective and the additional requirements show that they do not contradict to the rationale already given in the Protection Profile for the assumptions policy and threats defined there Moreover these additional security functional requirements cover the requirements by 3 user data protection of chapter 11 which are not refined by the PP 1 Nevertheless the developer of the Smartcard Embedded Software must ensure that the additional functions are used as specified and that the User Data processed by these functions are protected as defined for the application context The TOE only provides the t
97. quirements Version 3 1 Revision 3 July 2009 CCMB 2009 07 002 Common Criteria for Information Technology Security Evaluation Part 3 Security Assurance Requirements Version 3 1 Revision 3 July 2009 CCMB 2009 07 003 otatus report List of all available user guidance Functionality classes and evaluation methodology for physical random number generators taken from AIS31 Version 1 25 09 2001 SLE SLM70 Family Hardware Reference Manual Infineon Technologies AG Edition 2010 01 Joint Interpretation Library Application of Attack Potential to Smartcards Version 2 7 February 2009 SLE78 Confidential Errata sheet SLE SLM 70 Family Programmers Reference User Manual Infineon Technologies AG 2010 03 Note that the versions of these documents will be defined at the end of the evaluation and listed in the certification report V0 5 Date 2010 06 10 Page 68 73 pam oe M7820 Infineon PUBLIC Security Target 10 Appendix In Table 21 the hash signatures of the respective CL70 Crypto Library file are documented For convenience purpose several hash values are referenced Table 21 Reference hash values of the CL70 Crypto Libraries Library Hash Value CI70 LIB base XSMALL HUGE lib v1 1 Build 18 8ced1da64f18646426f4a345b9848028 01 abbbadba4636d394c751ba90b7fccc47565212 53750a5f3517069874c34e9b8e36b8eb4a6cf8faf49e675156f01c74fdef61d6 CI70 LIB 2k XSMALL HUGE lib v1 1 Build 18 dbb6ce052b32c764e4e7f0ced2b8bf3e bc281fe5c9b30870a097b85
98. re FDP ACC 1 FDP ACF 1 EMT MSA 1 FMT MSA 3 and EMT SMF1 The SF PMA Protection against Modifying Attacks covers the security functional requirements FPT PHP 3 FDP IFC 1 FPT ITT 1 FDP ITT 1 FMT MSA 1 FMT_MSAS3 EMT SMF 1 FDP ACC 1 FDP ACF 1 FRU FLT 2 FPT TST 2 FDP SDI 1 EDD SDI 2 and FPT FLS 1 8 4 SF PLA Protection against Logical Attacks The memory access control of the TOE uses a memory management unit MMU to control the access to the available physical memory by using virtual memory addresses and to segregate the code and data to a privilege level model The MMU controls the address permissions of up seven privileged levels and gives the software the possibility to define different access rights for the privileged levels 3 to 7 The address permissions of the privilege levels are controlled by the MMU In case of an access violation the MMU will trigger a reset and then a trap service routine can react on the access violation The policy of setting up the MMU and specifying the memory ranges for the privilege levels with the exception of the IFX level is defined from the user software OS The privilege levels 0 1 and 2 are reserved for TOE internal operations The privilege levels 3 and 4 are reserved for operation systems and the privilege levels 5 6 and 7 are reserved for applications As the TOE provides support for separation of memory areas the covered security functional requirements are FDP ACC 1 Subset access c
99. requirement FCS COP 1 Therefore these security functional requirements support the secure implementation and operation of FCS COP 1 As disturbing manipulating during or forcing the results of the test checking the security functions after TOE delivery this security functional requirement FPT TST 2 has to be protected An attacker could aim to switch off or disturb certain sensors or filters and preserve the detection of his manipulation by blocking the correct operation of FPT_TST 2 The security functional requirements required to meet the security objectives O Leak Inherent O Phys Probing O Malfunction O Phys Manipulation and O Leak Forced also protect the security functional requirement FPT TST 2 Therefore the related security functional requirements support the secure implementation and operation of FPT TST 2 The requirement FPT TST 2 allows testing of some security mechanisms by the Smartcard Embedded Software after delivery In addition the TOE provides an automated continuous user transparent testing of certain functions The implemented privilege level concept represents the area based memory access protection enforced by the MMU As an attacker could attempt to manipulate the privilege level definition as defined and present in the TOE the functional requirement FDP ACC 1 and the related other requirements have to be protected themselves The security functional requirements required to meet the security objectives O Leak Inhere
100. ring based on good commercial practices In order to provide a meaningful level of assurance that the TOE provides an adequate level of defence against such attacks the evaluators should have access to all information regarding the TOE including the TSF internals the low level design and source code including the testing of the modular design Additionally the mandatory technical document Application of Attack Potential to omartcards 11 shall be taken as a basis for the vulnerability analysis of the TOE ALC DVS 2 Sufficiency of security measures Development security is concerned with physical procedural personnel and other technical measures that may be used in the development environment to protect the TOE In the particular case of a Security IC the TOE is developed and produced within a complex and distributed industrial process which must especially be protected Details about the implementation e g from design test and development tools as well as Initialization Data may make such attacks easier Therefore in the case of a Security IC maintaining the confidentiality of the design is very important his assurance component is a higher hierarchical component to EALS which only requires ALC DVS 1 ALC_DVS 2 has no dependencies V0 5 Date 2010 06 10 Page 55 73 M7820 Infineon PUBLIC Security Target AVA VAN 5 Advanced methodical vulnerability analysis Due to the intended use of the TOE it must be sho
101. rmware containing EEPROM programming routines AIS31 testbench etc oymmetric cryptographic coprocessor for symmetric cryptographic operations 3DES AES Part of the firmware with routines for controlling the operating state and testing the TOE hardware Part s of the TOE used to implement part s of the security objectives Description of the intended state for countering threats Plastic card in credit card format with built in chip Information non physical part of the system which is required to implement functionality in conjunction with the hardware program code Entity generally in the form of a person who performs actions Product or system which is being subjected to an evaluation Operational status phase of the TOE in which actions to test the TOE hardware take place Action or event that might prejudice security Operational status phase of the TOE in which actions intended for the user takes place V0 5 Date 2010 06 10 Page 73 73
102. rol UMSLC and connected to the clock pad The covered security functional requirements are FPT PHP 3 and FPT FLS 1 An induced error which can not be corrected will be recognized by the Integrity Guard and leads to an alarm In case of security critical detections a security alarm and reset is generated The covered security functional requirement is FPT FLS 1 The SF PS Protection against Snooping covers the security functional requirements FPT PHP 3 FDP IFC 1 FPT ITT 1 FDP ITT 1 and FPT FLS 1 8 3 SF PNA Protection against Modifying Attacks First of all we can say that all security mechanisms effective against snooping SF PS apply also here since a reasonable modification of data is almost impossible on dynamically encrypted masked scrambled transparently relocated randomized and topologically protected hardware Due to this the covered security functional requirements are FPT PHP 3 FDP IFC 1 FPT ITT 1 FDP ITT 1 FPT FLS 1 and FRU FLT 2 The TOE is equipped with an error detection code EDC which covers the memory system of RAM ROM and EEPROM and includes also the MED MMU and the bus system Thus introduced failures are securely detected and in terms of single bit errors in the EEPROM also automatically corrected EDD SDI 2 In order to prevent accidental bit faults during production in the ROM over the data stored in ROM an EDC value is calculated EDD SDI 1 The covered security functional requirements are FRU FLT 2 FPT
103. rrect operation of the security functions Therefore the TOE shall support that particular security functions or mechanisms are tested in the operational phase Phase 7 The tests can be initiated by the Smartcard Embedded Software and or by the TOE or is done automatically and continuously Part 2 of the Common Criteria provides the security functional component TSF testing FPT_TST 1 The component FPT TST 1 provides the ability to test the TSF s correct operation For the user it is important to know which security functions or mechanisms can be tested The functional component FPT TST 1 does not mandate to explicitly specify the security functions being tested In addition FPT TST 1 requires verification of the integrity of TSF data and of the stored TSF amp ecutable code which might violate the security policy Therefore the functional component Subset TOE security testing FPT TST 2 of the family TSF self test has been newly created This component allows that particular parts of the security mechanisms and functions provided by the TOE are tested 6 2 Definition of FPT TST 2 The functional component Subset TOE security testing FPT TST 2 has been newly created Common Criteria Part 2 extended This component allows that particular parts of the security mechanisms and functions provided by the TOE can be tested after TOE Delivery or are tested automatically and continuously during normal operation transparent for the user Th
104. rror detection unit EDU automatically manages the error detection of the individual memories and detects incorrect transfer of data between the memories by means of error code comparison The cache memory or simply the cache is a high speed memory buffer located between the CPU and the external main memories holding a copy of some of the memory contents to enable access to the copy which is considerably faster than retrieving the information from the main memory In addition to its fast access speed the cache also consumes less power than the main memories All cache systems own their usefulness to the principle of locality meaning that programs are inclined to utilize a particular section of the address space for their processing over a short period of time By including most or all of such a specific area in the cache system performance can be dramatically enhanced The implemented post failure detection identifies and manages errors if appeared during storage The TRNG is specially designed for smart card applications The TRNG fulfils the requirements from the functionality class P2 of the AIS31 and produces genuine random numbers which then can be used directly or as seed for the PRNG The PRNG is not in the scope of the evaluation The implemented sleep mode logic clock stop mode per ISO IEC 7816 3 is used to reduce the overall power consumption Contactless products provide a low power halt mode for operation with reduced power
105. s by this one of the most important security features of this platform As the results of both CPUs are compared at the end a fault induction of modifying attacks would have to be done on both CPUS at the correct place with the correct timing despite all other countermeasures like dynamic masking encryption and others As the comparison and the register files are also protected by various measures successful manipulative attacks are seen as being not practical During start up the STS performs the User Mode Security Life Control UMSLC which is checking alarm lines and or following functions and sensors for correct operation e PFD Post Failure Detection e CORE CPU related alarms e SCP Symmetric Cryptographic Co Processor e Temperature alarm e AXI Memory Bus e NVM MISS NVM illegal addressing alarm e EDC Error Detection Code e FSE Internal Frequency Sensor alarm e Light Light sensitive alarm e WDT Watch Dog Timer related alarms e SW Software triggered alarm e TRNG True Random Number Generator This test can also be released actively by the user software during normal operation chip operation after the start up Sequence has been successfully finished In the case that a physical manipulation or a physical probing attack is detected the processing of the TOE is immediately stopped and the TOE enters a secure state called security reset The covered security functional requirements are FPT_FLS 1 FPT_PHP 3 and FPT_
106. s finished and the extended test features are removed In this document are always both cases mentioned to avoid incorrectness but from the security policy point of view the two cases are identical The delivery to the software developer phase 2 gt phase 1 contains the development package and is delivered in form of documentation as described above data carriers containing the tools and emulators as development and debugging tool Part of the software delivery is also the Flash Loader program provided by Infineon Technologies running on the TOE and receiving via the UART interface the transmitted information of the user software to be loaded into the EEPROM flash memory The download is only possible after successful authentication The user software can also be downloaded in an encrypted way In addition the user can permanently block further use of the Flash Loader 2 2 6 Production sites The TOE may be handled in different production sites but the silicon is produced in Dresden only as listed below To distinguish the different production sites of various products in the field the site is coded into the Chip Ident Mode data The exact coding of the chip identification data is described in 7 The delivery measures are described in the ALC_DVS aspect Table 5 Production site in chip identification Production Site Chip Identification Bits 7 4 of batch byte number 06 Dresden 0010 V0 5 Date 2010 06 10 Page 20 73
107. security functionality which can be used by the Smartcard Embedded ooftware In the following specific security functionality is listed which is not derived from threats identified for the TOE s environment because it can only be decided in the context of the smartcard application against which threats the Smartcard Embedded Software will use the specific security functionality The IC Developer Manufacturer must apply the policy Additional Specific Security Functionality P Add Functions as specified below P Add Functions Additional Specific Security Functionality The TOE shall provide the following specific security functionality to the Smartcard Embedded Software e Advanced Encryption Standard AES e Triple Data Encryption Standard 3DES e Hivest Shamir Adleman Cryptography RSA e Elliptic Curve Cryptography EC e Secure Hash Algorithm SHA 2 Note 3 The cryptographic libraries RSA EC and SHA 2 are delivery options Therefore the TOE may come with free combinations of or without these libraries In the case of coming without one or any combination of these libraries the TOE does not provide the Additional Specific Security Functionality Rivest Shamir Adleman Cryptography RSA and or Elliptic Curve Cryptography EC and or SHA 2 End of note Note 4 This TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both aypto co processors blocked The blocking
108. security target the TOE is described and a summary specification is given The security environment of the TOE during its different phases of the lifecycle is defined The assets are identified which have to be protected through the security policy The threats against these assets are described The security objectives and the security policy are defined as well as the security requirements These security requirements are built up of the security functional requirements as part of the security policy and the security assurance requirements These are the steps during the evaluation and certification showing that the TOE meets the targeted requirements In addition the functionality of the TOE matching the requirements is described The assets threats security objectives and the security functional requirements are defined in this oecurity Target and in 1 and are referenced here These requirements build up a minimal standard common for all Smartcards The security functions are defined here in the security target as property of this specific TOE Here itis shown how this specific TOE fulfils the requirements for the standard defined in the Protection Profile 1 V0 5 Date 2010 06 10 Page 12 73 M7820 Infineon PUBLIC Security Target 2 Target of Evaluation Description The TOE description helps to understand the specific security environment and the security policy In this context the assets threats security objecti
109. start up regular interval or under specified conditions e management of the time of the interval appropriate Audit FPT TST 2 There are no auditable events foreseen FPT TST 2 Subset TOE testing Hierarchical to No other components Dependencies FPI AMT 1 Abstract machine testing FPT TST 2 1 The TSF shall run a suite of self tests selection during initial start up periodically during normal operation at the request of the authorized user and or at the conditions assignment conditions under which self test should occur to demonstrate the correct operation of assignment functions and or mechanisms V0 5 Date 2010 06 10 Page 34 73 pam oe M7820 Infineon PUBLIC Security Target 7 Security Requirements ASE_REQ For this section the PP 1 section 6 can be applied completely 7 1 TOE Security Functional Requirements The security functional requirements SFR for the TOE are defined and described in the PP 1 section 6 1 and in the following description The Table 15 provides an overview of the functional security requirements of the TOE defined in the in PP 1 section 61 In the last column it is marked if the requirement is refined The refinements are also valid for this ST Table 15 Security functional requirements defined in PP 1 Security Functional Requirement Refined in PP 1 FRU FLT 2 Limited fault tolerance FPT FLS 1 Failure with preservation of secure state es i i s FDP ITT 1 B
110. t meet the following standards U S Department of Commerce National Institute of Standards and Technology Information Technology Laboratory ITL Advanced Encryption Standard AES FIPS PUB 197 Note 8 This TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both crypto co processors blocked The blocking depends on the customer demands prior to the production of the hardware In case the SCP is blocked no AES and 3DES computation supported by hardware is possible In case the Crypto2304T is blocked no RSA and EC computation supported by hardware is possible The use of the SHA 2 library is also possible with both crypto coprocessors blocked No accessibility of the deselected cryptographic CO processors is without impact on any other security policy of the TOE it is exactly equivalent to the situation where the user decides just not to use the cryptographic co processors End of note Rivest Shamir Adleman RSA operation The Modular Arithmetic Operation of the TOE shall meet the requirement Cryptographic operation FCS COP 1 as specified below FCS COP 1 RSA Cryptographic operation Hierarchical to No other components Dependencies FDP_ITC 1 Import of user data without security attributes or FDP_ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key generation FCS CKM 4 Cryptographic key destruction FCS COP 1 1 RSA The TSF shall p
111. tes or FCS CKM 1 Cryptographic key generation e FCS CKM 4 Cryptographic key destruction All these requirements have to be fulfilled to support OE Resp Appl for FCS COP 1 DES 3DES algorithm and for FCS_COP 1 AES AES algorithm For the FOS _COP 1 RSA RSA algorithm and FCS_COP 1 ECDSA and FCS_COP 1 ECDH both EC algorithms the FCS_CKM 1 RSA and FCS CKM 1 EC are optional since they are fulfilled by the TOE or may be fulfilled by the environment as the user can generate keys externally additionally V0 5 Date 2010 06 10 Page 50 73 M7820 Infineon PUBLIC Security Target The security functional requirements required to meet the security objectives O Leak Inherent O Phys Probing O Malfunction O Phys Manipulation and O Leak Forced define how to implement the specific security functionality However key dependent functions could be implemented in the omartcard Embedded Software The usage of cryptographic algorithms requires the use of appropriate keys Otherwise these cryptographic functions do not provide security The keys have to be unique with a very high probability and must have a certain cryptographic strength etc In case of a key import into the TOE which is usually after TOE delivery it has to be ensured that quality and confidentiality are maintained Keys for 3DES and AES are provided by the environment Keys for RSA and EC algorithms can be provided either by the TOE or the environment In this ST t
112. ts for RSA 2048 bit 4096 bit with CRT and Elliptic Curve EC cryptography The delivered software part of the TOE consists of the three libraries the RSA library the EC library and the SHA 2 library The RSA library is used to provide a high level interface to RSA Rivest Shamir Adleman cryptography implemented on the hardware component Crypto2304T and includes countermeasures against SPA DPA and DFA attacks The routines are used for the generation of RSA Key Pairs RsaKeyGen the RSA signature verification RsaVerify the RSA signature generation RsaSign and the RSA modulus recalculation RsaModulus The hardware Crypto2304 T unit provides the basic long number calculations add subtract multiply square with 1100 bit numbers with high performance The RSA library is delivered as object code and in this way integrated in the user software The RSA library can perform RSA operations from 512 to 4096 bits Note that key lengths below 1024 bit are not included in the certificate The EC library is used to provide a high level interface to Elliptic Curve cryptography implemented on the hardware component Crypto2304T and includes countermeasures against SPA DPA and DFA attacks The routines are used for ECDSA signature generation ECDSA signature verification ECDSA key generation and Elliptic Curve Diffie Hellman key agreement The EC library is delivered as object code and in this way integrated in the user software The EC library c
113. types are equipped with an error detection code EDC the EEPROM in addition with an error correction code ECC The security modules serve for operation within the specified range and manage the alarms The implemented dual interface provides a maximum flexibility in using different communication protocols ISO 7816 ISO IEC 14443 Type A and Type B ISO IEC 18092 passive mode and Mifare compatible Interface can be chosen and configured Supporting a Mifare compatible Interface application requires a dedicated small space of memory Depending on user s choice various Mifare compatible Interface memory sections of 1 up to 4 kByte each can be defined The number and location of Mifare compatible Interface memory sections is simply limited by the available EEPROM space The Mifare compatible Interface memory sections are read write protected and are defined and generated by the user Note that there is a small set of sensors left in order to detect excessive deviations from the specified operational range while not being over sensitive These digital features do not need adjustment or calibration and makes the chip even more robust Conditions that would not be harmful for the operation would in most cases not influence the proper function The CPU here the two processors CPU1 and CPU2 are seen from functional perspective as one is compatible with the instruction set of the forerunner family 66 PE and is therefore also compatible
114. urity function is introduced to include the cryptographic operation in the scope of the evaluation as the cryptographic function respectively mathematic algorithm itself is not used from the TOE security policy On the other hand these functions are of special interest for the use of the hardware as platform for the software The components are a co processor supporting the DES and AES algorithms and a combination of a co processor and software modules to support RSA cryptography RSA key generation ECDSA signature generation and verification ECDH key agreement and EC public key calculation and public key testing 8 5 1 3DES The TOE supports the encryption and decryption in accordance with the specified cryptographic algorithm Triple Data Encryption Standard 3DES in the Electronic Codebook Mode ECB the V0 5 Date 2010 06 10 Page 61 73 M7820 Infineon PUBLIC Security Target Cipher Block Chaining Mode CBC the Blinding Feedback Mode BLD and the Cipher Feedback Mode CFB and with cryptographic key sizes of 112 bit or 168 bit meeting the standard National Institute of Standards and Technology NIST Technology Administration U S Department of Data Encryption Standard DES NIST Special Publication 800 67 Version 1 1 The covered security functional requirements are FCS_COP 1 DES 8 5 2 AES The TOE supports the encryption and decryption in accordance with the specified cryptographic algorithm Advanced
115. urity functions Therefore the TOE shall support that particular security functions or mechanisms are tested in the operational phase Phase 7 The tests can be initiated by the Smartcard Embedded Software and or by the TOE The TOE shall meet the requirement Subset TOE testing FPT TST 2 as specified below Common Criteria Part 2 extended FPT TST 2 Subset TOE testing Hierarchical to No other components Dependencies FPI AMT 1 Abstract machine testing FPT_TST 2 1 The TSF shall run a suite of self tests at the request of the authorised user to demonstrate the correct operation of the alarm lines and or following environmental sensor mechanisms e PFD Post Failure Detection e CORE CPU related alarms e SCP Symmetric Cryptographic Co Processor e Temperature alarm e AXI Memory Bus e NVM MISS NVM illegal addressing alarm e EDC Error Detection Code e FSE Internal Frequency Sensor alarm e Light Light sensitive alarm e WDT Watch Dog Timer related alarms e SW Software triggered alarm e TRNG True Random Number Generator 7 1 3 Memory access control Usage of multiple applications in one Smartcard often requires code and data separation in order to prevent that one application can access code and or data of another application For this reason the TOE provides Area based Memory Access Control The underlying memory management unit MMU is documented in section 4 of the 7 V0 5 Date 2010 06 10 Page 3
116. ves and security functional requirements can be employed The following is a more detailed description of the TOE than in 1 as it belongs to the specific TOE 2 1 TOE Definition This TOE consists of smart card ICs Security Dual Interface Controllers meeting the highest requirements in terms of performance and security They are manufactured by Infineon Technologies AG in a 120 nm CMOS technology C120FL This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems according to the lifecycle model from 1 The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE The TOE is the platform for the Smartcard Embedded Software The Smartcard Embedded Software itself is not part of the TOE The TOE consists of a core system memories co processors peripherals security modules and analogue peripherals The major components of the core system are the two CPUs Central Processing Units the MMU Memory Management Unit and MED Memory Encryption Decryption Unit The co processor block contains the processors for RSA EC and DES AES processing while the peripheral block contains the random number generation and the external interfaces service The peripheral block contains also the timers and a watchdog All data of the memory block is encrypted and all memory
117. view the different roles in the Smartcard Embedded Software can be distinguished according to the memory based access control However the definition of the roles belongs to the user software The following Security Function Policy SFP Memory Access Control Policy is defined for the requirement Security attribute based access control FDP ACF 1 Memory Access Control Policy The TOE shall control read write delete and execute accesses of software running at the privilege levels as defined below Any access is controlled regardless whether the access is on code or data or a jump on any other privilege level outside the current one The memory model provides distinct independent privilege levels separated from each other in the virtual address space These levels are referred to as the Infineon Technologies IFX level operating system 1 and 2 levels OS1 OS2 shared application level and application 1 and 2 levels A pseudo level is the current level which is simply the level on which code is currently being executed The access rights are controlled by the MMU and related to the privilege level as depicted in following diagram Current level u Reserved IFX level V0 5 Date 2010 06 10 Page 38 73 M7820 Infineon PUBLIC Security Target Figure 2 Privilege Levels ofthe TOE The TOE shall meet the requirement Subset access control FDP_ACC 1 as specified below FDP ACC 1 Subset access c
118. wn to be highly resistant to penetration attacks This assurance requirement is achieved by the AVA VAN 5 component Independent vulnerability analysis is based on highly detailed technical information The main intent of the evaluator analysis is to determine that the TOE is resistant to penetration attacks performed by an attacker possessing high attack potential AVA VAN 5 has dependencies to ADV ARC 1 Security architecture description ADV FSP 2 Security enforcing functional specification ADV TDS 3 Basic modular design ADV IMP 1 Implementation representation of the TSF AGD OPE 1 Operational user guidance and AGD_PRE 1 Preparative procedures All these dependencies are satisfied by EAL5 It has to be assumed that attackers with high attack potential try to attack Security ICs like smart cards used for digital signature applications or payment systems Therefore specifically AVA_VAN 5 was chosen in order to assure that even these attackers cannot successfully attack the TOE V0 5 Date 2010 06 10 Page 56 73 M7820 Infineon PUBLIC Security Target 8 TOE Summary Specification ASE_TSS The product overview is given in section 2 1 In the following the Security Features are described and the relation to the security functional requirements is shown The TOE is equipped with following Security Features to meet the security functional requirements SF_DPM Device Phase Management SF_PS Prote
119. yption Standard 3DES e Elliptic Curve Cryptography EC e Rivest Shamir Adleman RSA e Secure Hash Algorithm SHA 2 Triple DES Operation The DES Operation of the TOE shall meet the requirement Cryptographic operation FCS_COP 1 as specified below FCS COP 1 DES Cryptographic operation Hierarchical to No other components Dependencies FDP_ITC 1 Import of user data without security attributes or FDP_ITC 2 Import of user data with security attributes or FCS CKM 1 Cryptographic key management FCS CKM 4 Cryptographic key destruction FCS COP 1 1 DES The TSF shall perform encryption and decryption in accordance with a specified cryptographic algorithm Triple Data Encryption Standard 3DES in the Electronic Codebook Mode ECB in the Cipher Block Chaining Mode CBC in the Blinding Feedback Mode BLD and in the Cipher Feedback Mode CFB and with cryptographic key sizes of 2 x 56 bit or 3 x 56 bit that meet the following standards National Institute of Standards and Technology NIST Technology Administration U S Department of Data Encryption Standard DES NIST Special Publication 800 67 Version 1 1 Note 7 This TOE can come with both crypto co processors accessible or with a blocked SCP or with a blocked Crypto2304T or with both aypto co processors blocked The blocking depends on the customer demands prior to the production of the hardware In case the SCP is blocked no AES and 3DES computation supported by
120. ysical design data e C Dedicated Software Security IC Embedded Software Initialisation Data and Pre personalisation Data e specific development aids e test and characterisation related data e material for software development support and e reticles and products in any form as long as they are generated stored or processed by the TOE Manufacturer For details see PP 1 section 3 1 V0 5 Date 2010 06 10 Page 25 73 M7820 Infineon PUBLIC Security Target 4 2 Organizational Security Policies The TOE has to be protected during the first phases of their lifecycle phases 2 up to TOE delivery which can be after phase 3 or phase 4 Later on each variant ofthe TOE has to protect itself The organisational security policy covers this aspect P Process TOE Protection during TOE Development and Production An accurate identification must be established for the TOE This requires that each instantiation of the TOE carries this unique identification The organisational security policies are defined and described in PP 1 section 3 3 Due to the augmentations of PP 1 an additional policy is introduced and described in the next chapter Table 9 Organizational Security Policies according PP 1 P Process TOE Protection during TOE Development and Production 4 2 1 Augmented Organizational Security Policy Due to the augmentations of the PP 1 an additional policy is introduced The TOE provides specific
Download Pdf Manuals
Related Search
Related Contents
USER`S MANUAL Recommended Rules Changes - Sports Car Club of America [PDF:4.7MB] Cables Direct B5-105 networking cable Peavey 3 User's Manual DCR-SR90E L-4P-v3 frances - Abrapal Comercial Lozano 取扱説明書 コンパクトナトリウムイオンメータ B-722 Copyright © All rights reserved.