Home
ST KT2USB - Common Criteria
Contents
1. P g ende kommandon avbryts Ongoing command aborted Comex Electronics AB Page 51 54 Avtrycksl sning Avbruten Print entry Aborted Avtryck 1 fel 2 f rs k kvar Print 1 wrong 2 attempts left Avtryck 2 fel 2 f rs k kvar Print 2 wrong 2 attempts left 1 Visa avtryck 1 Show print 2 Registrera avtryck 2 Register print 3 Testa avtryck 3 Test print 4 Radera avtryck 4 Erase print 5 L s upp avtryck 5 Unblock print H ger pekfinger R index finger registrering Avtryck 1 Print 1 lagrat stored Avtryck 2 Print 2 lagrat stored V lj finger Select finger H ger pekfinger R index finger H ger pekfinger R index finger Anv nds redan already used Misslyckad Unsuccessful registration Avtrycksl sning Avbruten Print entry Aborted P g ende kommandon Ongoing command avbryts aborted Avtryck 1 Print 1 blockerat blocked Avtryck 2 Print 2 blockerat blocked Avtryck 1 OK Print 1 OK Avtryck 2 OK Print 2 OK Avtryck 1 blockerat Avtryck 2 blockerat Print 1 blocked Print 2 blocked Radera avtryck Erase print Comex Electronics AB Page 52 54 OK Ja CLR Nej OK Yes CLR No Ej registrerat Avtryck 1 Print 1 raderat erased Avtryck 2 Print 2 raderat erased Avtryck 1 Print 1 uppl st unblocked Avtryck 2 Print 2 uppl st unblocked V lj avtryck Sel
2. The TOE versions KT2USB U2 KT2USB STD BioSec B and BioSec C are powered through the USB interface Removing these versions of the TOE from the host PC will result in a shutdown and loss of all data and PIN status TSF_EMERGENCY Emergency Erase The KT2USB versions of the TOE can erase symmetrical encryption keys and associated data stored on Swedish Defence smart cards having the correct profile e g NBK and TAK The erasure can be performed without the user having to open the smart card by entering a PIN The user initiates emergency erasure by pressing the F1 key which is a function key located on the TOE or by using an application on a host PC The completion incompletion of the erasure process is indicated to the user on the display The buzzer will indicate a successful erasure with one long beep and a faulty erasure with four short beeps For the BioSec versions of the TOE the F1 key is not in use nothing will happen if the user presses the F1 key It is the T11 byte in the ATR that informs the TOE if the smart card profile supports this functionality or not If bit3 of the T11 byte equals 0 the smart card contains encryption keys and supports the emergency erase functionality TSF_DATAFLOW Red Yellow and Black modes TSF_FDP_4 and TSF_FDP_5 The TOE hardware is designed in such a way that all communication between internal modules must go through the microcontroller The memory for storing the program and user data is c
3. i The TOE can trigger erasure of symmetrical keys and associated user data stored on Swedish Defence smart cards KOP Key Overwrite Procedure This feature concerns only the KT2USB series j The TOE has a watchdog that resets the TOE if it stalls k The TOE resets the smart card if the Rx signal Rx receive data signal in the fibre optical interface is lost only KT2USB U1 version and BioSec A version The TOE displays the status of PIN and fingerprint operations on the display and informs the host PC whether a smart card is inserted or not m To ensure the usage of the TOE keyboard and fingerprint sensor the TOE blocks all PIN SO7816 and fingerprint related commands sent from the host PC if e itis a Swedish Defence smart card inserted in a KT2USB version of the TOE e itis a BioSec Card inserted in a BioSec Reader version of the TOE Intended Method of Use The use of the smart card reader in applications is to protect against unauthorised access by providing strong identification and authentication The intended use must in addition support accountability and identification of who carried out certain operation by the use of digital signatures The use must also allow the user to transfer data e g cryptographic keys in a protected way to and from the smart card and a host PC connected to the smart card reader The smart card reader will allow a host PC to use the functionality of the smart card while protecting the sm
4. 6 7 Security requirement Dependencies comment CCR_IDE 1 No dependencies ER CCR_STA 1 No dependencies Table 18 SFR dependency analysis Unresolved Dependencies The unresolved dependency from FDP_IFF 1b to FMT_MSA 3 Static attribute initialisation is not resolved since the attributes used for enforcing the CBLOCK information flow SFP are the command types and not configurable attributes Even so these commands are not generated within the TOE but commands that are generated by the TOE environment The unresolved dependency from FDP_IFF 1a and FDP_IFF 1c to FMT_MSA 3 Static attribute initialisation is not resolved since the attributes used for enforcing the NFLOW and UDFLOW information flow SFPs are the external interfaces of the TOE and cannot be configured by the TOE user Justification for Explicitly Stated IT Security Requirements There are two explicitly stated IT security requirements namely CCR_IDE 1 and CCR_STA 1 which cannot be easily modelled by CC components because they define functionality to indicate the TOE s version identification number and status indication that is very specific to smart card readers and smart cards TOE Security Assurance Requirements The ST is CC Part 2 extended and Part 3 conformant with a claimed Evaluation Assurance Level of EAL4 augmented by ALC_FLR 1 Security Assurance Requirements Rationale The evaluation assurance level has been chosen for all versions of the TOE
5. 3 2 Security Problem Definition Assets The assets to be protected by the TOE are PIN and PUK data This is the data entered on the keypad to authenticate the user for the smart card Fingerprint data This is the data sent between the fingerprint sensor to the fingerprint processor via the microcontroller to the smart card to authenticate the user for the smart card SC Command This is commands and answers according to I SO7816 and fingerprint related commands sent between the smart card and the TOE via the smart card interface PC Command This is commands and answers according to ISO7816 or USB ICC and CCID sent between the host PC and the TOE via the USB interface All data mentioned above is called user data TSF data This is the firmware running in the microcontroller Threats This section identifies and describes the relevant threats for the TOE in the TOE environment Different types of threats will be directed against the TOE Attackers are expected to have various levels of expertise resources and motivation up to an attack potential of enhanced basic Attacks may be carried out in attempts to bypass or to break the security functions Attacks may also include manipulation and replacements of equipment in operation storage or under transport Attackers threat agents will attempt to access data from previous users or to modify user data as specified under Assets and TOE security functi
6. Security techniques Guide for the production of protection profiles and security targets Identification Cards Physical Characteristics Common Criteria for Information Technology Security Evaluation CC Part 1 3 Version 3 1 Revision 3 July 2009 ISO IEC TR15446 2009 Guide for the Production of Protection Profiles and Security Targets CCID rev 1 1 Smart Card Integrated Circuit s Card Interface Devices FMV Elektro H M77 3810 91 Version 2 Forsvarets Materielverk ISO 19794 2 Information technology Biometric data interchange formats ISO IEC 7810 2003 Identification Cards Physical Characteristics 2003 11 10 Identification Cards Integrated Circuit Cards with Contacts Part 1 to 4 ISO IEC 7816 1 Identification Cards Integrated circuit s cards with contacts Part 1 Physical Characteristics ISO IEC 7816 2 Identification Cards Integrated circuit s cards with contacts Part 2 Dimensions and Locations of the contacts ISO IEC 7816 3 Identification Cards Integrated circuit s cards with contacts Part 3 Electronic signals and transmission protocols ISO IEC 7816 4 Identification Cards Integrated circuit s cards with contacts Part 4 Inter industry commands for interchange PKCS 15 v1 1 Cryptographic Token Information Syntax Standard RSA Laboratories June 6 2000 Protection Profile FMV Smart Card Draft Version 1 0 August 2000 PP FMVSC FMV Smart Card Reader Protection Pr
7. security objective by ensuring that a management function is available that will trigger an emergency erase of symmetrical encryption keys and associated data stored on Swedish Defence smart cards having the correct profile e g NBK and TAK The result of the emergency erase operation is presented on the display see number 6 13 in table 15 The TOE meets the security objective by enforcing the information flow security policy CBLOCK filtering the commands from the host PC to the smart card Table 16 Security Objectives Related to Security Requirements Security requirement Is necessitated by FDP_ETC 1 O Leakage FDP_IFC 1a O Residual O Leakage FDP_IFC 1b O Commands FDP_IFC 1c O Residual FDP_IFF 1a O Residual O Leakage FDP_IFF 1b O Commands FDP_IFF 1c O Residual Version 1 21 Comex Electronics AB Page 40 54 Security requirement Is necessitated by FDP_RIP 2 O Residual FMT_SMF 1 O Emergency FPT_FLS 1 O Malfunction FPT_RCV 4 O Malfunction FPT_TST 1 O Malfunction O Tampering CCR_IDE 1 O Substitute CCR_STA 1 O Malfunction O Emergency O Tampering Table 17 Security Functional Requirements Related to Security Objectives 6 5 2 Security Requirements Sufficiency and Dependency Analysis The security requirements sufficiency has only been demonstrated with security functional requirements and not with the security assurance requirements We have taken a predefined assur
8. 234567 Press OK Press OK Assert fail Assert fail File id 08 File id 08 Line 234 Line 234 Press OK Press OK Table 21 Pre defined texts within the TOE Comex Electronics AB Page 54 54
9. BioSec v1 00 03 X421001 01 Table 1 The hardware and firmware versions of the TOE The main differences in hardware versions between the smart card reader versions are e There are three different layouts for the motherboard as displayed in the table above Version 1 21 Comex Electronics AB Page 6 54 e Only KT2USB U1 and BioSec A includes a converter functionality from galvanic USB to fibre optical USB e KT2USB STD and BioSec C uses a different keypad There are two different firmware versions one used in the Swedish Defence series and one used in the export BioSec series All six versions of the smart card reader are covered by this Security Target 1 3 TOE Overview 1 3 1 TOE type The TOE is a smart card reader with keypad and a fingerprint reader See section 1 4 2 fora complete list of the smart card readers product features and security features 1 3 2 Required non TOE hardware and software The TOE is self contained and does not require any non TOE hard or software for its security The smart card reader enables the use of compatible smart cards and its functionalities when connected to a host PC capable of communicating with the smart card reader and the smart card 1 4 TOE Description 1 4 1 Introduction This part of the ST describes the TOE as an aid to the understanding of its security requirements and addresses the product type the intended usage and the general IT features of the
10. RATIONALE cidad tc aaa 27 4 3 1 Security Objectives COVELAGE cocinan 27 4 32 SUPTICIONCY AA RR need AARE EE AEAEE AE addenda deaidir deena HAE 28 5 EXTENDED COMPONENTS DEFINITION sysossossassssssssnsssnssssnsnsnsnsnsnsnrnnsnn rss rna cnn 31 5 1 CLASS CCR COMEX CARD READER sssessressreranersnersnorsnorssnrsanrssnrrssrsr sr sr stts ser nn sr RR RKS Ra sr br osa 31 5 1 1 Comex Card Reader Identification CCR_IDE osmmssssersrsserrsssserrrssrersrserrrr ser rrr rr sr re nrr rean 31 5 1 2 Comex Card Reader Status CCR ST smmossesrrsserrsrssersrsseersssrrrssserrsssrrrsssrnr sr sr rr sons ense on 32 6 SECURITY REQUIREMENTS sasssunsssssssonssosnonsnsnnnnnnnnnnsnnnnnnnnnnnnnnnen nn nn noe sne Rn RR ARR RR RR ARR AR RR RR RR Nn nn 33 6 1 THENFLOWESEP cuca aia O A eae aed 33 6 2 THEUDFEOWESFP lt aaa tie Sete eto tos dad sl ase tend et ets 33 6 3 THE CBLOCK SFP fastar sedernas ada donne a ania dential aed aii 33 6 4 TOE SECURITY FUNCTIONAL REQUIREMENTS 2 cccceceeeeceeeeeeeeeeeseaeeecaeeseeeeseaeeeseeeeeeneess 34 6 4 1 Class FDP User Data Protection rerien Vr RASERAS EEAO A HAR PARAS EKEN AE 35 Version 1 21 Comex Electronics AB Page 3 54 6 4 2 Class FMT Specification of Management FUNCTIONS mmseersssserrrrsrrrrrrrrrrrrrrrrr narran 37 6 4 3 Class FPT Protection of the TOE Security Functions mnussmmsserrssserrrrsrrrrrsrersrsrrrrr rer rr rear 37 6 5 SECURITY FUNCTIONAL REQUIREMENTS RATIONALE ccceecceceeeeeeeeecee
11. Swedish Defence o Other smart cards ISO Cards Other types of smart cards that adhere to ISO7816 Note For the BioSec smart card readers the Swedish Defence cards are recognized as ISO smart cards The Swedish Defence smart cards will have the following ATR in hex TS 3B The configuration byte T11 will have the following value in the different card types TO 1E TA1 yy Etu TAK 111 06 11 80 NBK T11 07 72 69 TEID T11 0A DBK T11 0B CEK 111 1B Know Type T11 All other values T3 TT integrated circuit type T4 MM ROM mask identifier T5 VV ROM mask version number T6 xx card serial number T7 xx card serial number T8 xx card serial number T9 xx card serial number T10 xx applet version T11 xx configuration T12 zz card life status normal T13 90 T14 00 Table 2 The ATR for the Swedish Defence smart cards Version 1 21 Comex Electronics AB Page 9 54 The BioSec smart cards will have different values for the T1 and T2 byte as well as different length of the ATR in hex TS 3B TO 1F TA1 yy Etu T1 4A T2 41 T3 TT integrated circuit type T4 MM ROM mask identifier T5 VV ROM mask version number T6 xx card serial number T7 xx card serial number T8 xx card serial number T9 xx card serial number T10 xx applet version T11 xx configuration T12 zz card lif
12. cards TAK Totalf rsvarets aktiva kort For authentication signing in HEMLIG SECRET and HEMLIG TOP SECRET environments and for storing symmetrical encryption keys Java card with applets for PKCS 15 and SKS Symmetrical Key Storage TEID Totalf rsvarets Elektroniska ID kort For authentication signing in OPEN or HEMLIG RESTRICTED environments Java card with applet for PKCS 15 NBK Nyckelbararkort For storing and transporting symmetrical encryption keys only Java card with applet for SKS CEK Card for Encrypted Keys For storing and transporting encrypted symmetrical encryption keys only Java card with applet for SKS DBK Datab rarkort For storing and transporting of data only i e not keys such as configuration files Java card with applet for SKS Known Type future versions of TAK Totalf rsvarets aktiva kort o Other smart cards SO Cards Other types of smart cards not belonging to the Swedish Defence which adheres to ISO7816 Version 1 21 Comex Electronics AB Page 8 54 Note For the KT2USB smart card readers the BioSec card is recognized as an ISO smart card e BioSec series o BioSec smart cards BioSec card An ISO7816 smart card for authentication signing Java card with applet for PKCS 15 To be used together with the BioSec reader versions The PKCS 15 applet has a different AID Application Identifier than the smart cards belonging to the
13. manipulation A Tampering The TOE environment must provide the means for the user to detect physical tampering that may affect the integrity of the TSF Organizational Security Policies P Emergency Emergency erase The product family KT2USB of the TOE must for all versions of Swedish Defence smart cards having the correct profile provide the users the means with an emergency erase and verification to immediately delete Swedish Defence specific symmetric encryption keys and associated data stored on the smart card The erasure shall be possible without having to open the smart card e without having to enter a PIN P Commands Filtering of commands The product family KT2USB of the TOE must for all versions of Swedish Defence smart cards block all 1507816 PIN and fingerprint commands sent from the host PC interface to the smart card interface of the TOE Version 1 21 Comex Electronics AB Page 24 54 The product family BioSec Reader of the TOE must for all versions of BioSec smart cards block all SO7816 PIN and fingerprint commands sent from the host PC interface to the smart card interface of the TOE P Residual Erasure of user data The TOE must erase all user data such as PINs and data entered into the TOE and transferred to and from the TOE and the smart card as soon as the data has been processed and is no longer needed Version 1 21 Comex Electronics AB Page 25 54 4 1 4 2 Security Objec
14. operating in black mode or if the software tries to communicate through the USB interface while the smart card reader is operating in red mode Additional checks such as range checks on variables are also performed to ensure that the TOE software continues to operate as intended 7 1 2 2 TSF_WATCHDOG Watchdog timer TSF_FPT_3 While the TOE software is running the microcontroller periodically sends pulses to the watchdog circuit In case the program execution is stalled the watchdog circuit will not receive these pulses and the watchdog will therefore reset the microcontroller The reset causes an immediate restart of the TOE After the restart the user is notified of the watchdog reset on the display The buzzer beeps one time to indicate the watchdog reset 7 1 2 3 TSF_ID TOE Identification TSF FPT 4 The immediate TOE identifies itself to the user by displaying the software version number at start up The TOE also displays the serial number compilation date and time of the software in the menu system Different versions of the TOE are allowed to be used in different environments For the environment to be able to distinguish between the different versions of the TOE the TOE identifies itself to the host PC by sending model version number within the USB interface handshake process when connected to the host PC USB ICC 7 1 2 4 TSF STATUS Status indication TSF FMV 1 The TOE displays the status of the inserted smart car
15. rules hold PIN PUK and fingerprint data entered by the user on the keypad or the fingerprint sensor into the smart card reader is only flowing to the smart card interface of the TOE FDP_IFF 1 3a The TSF shall enforce no additional requirements FDP_IFF 1 4a The TSF shall explicitly authorise an information flow based on the following rules no additional requirements FDP_IFF 1 5a The TSF shall explicitly deny an information flow based on the following rules no additional requirements Application Note The external interfaces of the TOE are presented in Figure 4 FDP_IFF 1b Subset information flow control FDP_IFF 1 1b The TSF shall enforce the information flow control CBLOCK SFP based on the following types of subject and information security attributes the PIN and fingerprint commands received on the host PC interface to be sent to the smart card will be subject to the information flow control SFP CBLOCK based on the type of smart card identified FDP_IFF 1 2b The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold allowing all commands from the host PC to the smart cards that are not explicitly denied FDP_IFF 1 3b The TSF shall enforce the rule that for all smart cards not identified as ISO smart cards the commands listed in Table 13 Command blocking will be rejected FDP_IFF 1 4b The TSF shall explicitly authorise an inf
16. 1507816 Command CLA INS P1 P2 Le Data Verify PIN ISO7816 Any 20h Any Any Not 0 Any Change PIN ISO7816 Any 24h Any Any Any Any Unblock PIN ISO7816 Any 2Ch Any Any Any Any OT Unblock PIN Any 22h Any Any Any Any OT Download DA 80h C2h Any Any Any Any OT Download Positions 80h C4h Any Any Any Any OT Register 80h C6h Any Any Any Any OT Is registered 1 80h DOh Any Any Any Any Version 1 21 Comex Electronics AB Page 33 54 6 4 OT Upload DA 80h C8h Any Any Any Any OT Download candidates 80h Cah Any Any Any Any OT Verify fingerprint g 80h CCh Any Any Any Any OT Reset registration 0 80h Ceh Any Any Any Any Table 13 Command blocking These are fingerprint related commands implemented within the TOE OT Oberthur Technologies DA Distinct Areas Note The Verify PIN command with length 0 is used to read the PIN try counter of the smart cards Therefore it is not blocked by the TOE Note There is no command blocking for ISO smart cards i e cards identified by the smart card reader as ISO smart cards With these smart cards the TOE acts like a standard smart card reader Therefore e AKT2USB smart card reader only blocks commands when a Swedish Defence smart cards is used e A BioSec smart card reader only blocks commands when a BioSe
17. 2 02 03 Johan Anstrell Updated after comments from the evaluator and CSEC 1 10 2012 03 16 Johan Anstrell Updated after comments from the evaluator and CSEC 1 11 2012 03 28 Fredrik Larsson Updated after comments from the evaluator and Johan Anstrell CSEC 1 12 2012 03 29 Johan Anstrell Updated after comments from evaluator 1 13 2012 04 02 Johan Anstrell Updated after comments from evaluator 1 14 2012 04 10 Johan Anstrell Updated after comments from CSEC 1 15 2012 04 11 Johan Anstrell Updated after comments from evaluator 1 16 2012 04 12 Johan Anstrell Updated after comments from evaluator 1 17 2012 05 21 Johan Anstrell Updated after comments from CSEC 1 18 2012 08 24 Johan Anstrell Updated after comments from evaluator 1 19 2012 10 26 Johan Anstrell Updated after comments from evaluator 1 20 2012 11 05 Johan Anstrell Updated after comments from CSEC 1 21 2013 06 10 Johan Anstrell Added product article number information Version 1 21 Comex Electronics AB Page 2 54 Table of Contents T ANTRODUCTION is 6 1 1 SECURITY TARGET IDENTIFICATION assessrrssressrersrrrsrersrer enes er er rttr arr arr ARKA KAKA R KR RR KR RR KR Ra Sa ann 6 1 2 T OENIDENTIEIGA TION cosida 6 1 3 TOR OVERVIEW E td A A 7 1 3 1 TOE Picasa tabla 7 1 3 2 Required non TOE hardware and software sumrerrssssrererrrrsenrnnrrrrrrrrnrnrnr rr rr rn sen r nr rr ennen ren rn nn 7 1 4 MOE DESCRIPTION ass tacts board io olle rad 7 1 4 1 HATO DUCTION args ana sta kdb AAA AS s
18. COMEXe Security Target Version 1 21 Comex Electronics AB Page 1 54 Document History Version Change Date Author Changes 0 1 2010 12 31 Staffan Persson Initial version 0 2 2011 01 06 Johan Anstrell Updated content and formatting 0 3 2011 03 16 Johan Anstrell Updated after review from Comex and CSEC Staffan Persson 0 4 2011 03 16 Johan Anstrell Updated after review from Comex and CSEC Staffan Persson 0 5 2011 03 24 Johan Anstrell Updated after review from Comex 0 6 2011 03 29 Johan Anstrell Updated after review from Comex 0 7 2011 05 25 Johan Anstrell Updated after review from Comex 0 8 2011 06 16 Thomas Svensson Updated 0 9 2011 06 27 Johan Anstrell Updated after review by evaluator and CSEC 1 0 2011 09 08 Johan Anstrell Updated after review by evaluator and CSEC 2011 Staffan Persson 07 06 1 1 2011 09 19 Staffan Persson Updated based on comments from CSEC 1 2 2011 10 05 Johan Anstrell Updated based on comments from CSEC 1 3 2011 10 21 Johan Anstrell Updated after comments from the evaluator 1 4 2011 10 25 Johan Anstrell Updated after comments from MUST 1 5 2011 10 25 Johan Anstrell Updated table 9 1 6 2011 10 28 Johan Anstrell Updated after comments from MUST and evaluator 1 7 2011 10 28 Johan Anstrell Updated after comments from MUST and evaluator 1 8 2011 10 31 Johan Anstrell Updated after comments from MUST 1 9 201
19. Ds are unique to each specific model This must ensure that smart card readers cannot by mistake or intentionally being replaced in environments where certain security functionality that is not present in all smart card readers is required 6 4 3 5 CCR STA 1 Presenting status information to the user CCR STA 1 1 The TOE must present on the display pre defined status information listed in table 15 to the user as well as requests for user interaction with the TOE Nr Swedish text English text 1 Sj lvtest fel Selftest failed Tangentbord Keyboard Press OK Press OK 2 Sj lvtest fel Selftest failed Fingerprint Fingerprint Press OK Press OK 3 Sj lvtest fel Selftest failed Kortl sar ID Reader ID Press OK Press OK 4 Sj lvtest fel Selftest failed Checksumma Checksum Press OK Press OK 5 Omstart Watchdog Restart Watchdog 6 N dradering Emergency erase Felaktig korttyp Wrong card type 7 N dradera Emergency erase OK Ja CLR Nej OK Yes CLR No 8 Nycklar raderade Keys erased 9 Nyckelfil Key file ej tkomlig not accessible 10 Nyckelradering Key erasing misslyckades failed 11 Krybet fil Krybet file ej atkomlig not accessible Version 1 21 Comex Electronics AB Page 38 54 12 Krybet radering Krybet erasing misslyckades failed 13 N dradering Emergency erase Avbruten Aborted 14 Exception Exception Id 54 Id 54 Adr 234567 Adr 234567 Pre
20. S sssmssssssssssrererrssseonenrnrrrenenrrrr nr rr rann nn 47 Pre defined texts within the TOE sinnossssssssssersssssssrsrerrssrensenrernnsr enar nr rr rr sr anar sr snar RR arr RA RR AR Rn nr on an 54 Version 1 21 Comex Electronics AB Page 5 54 1 Introduction 1 1 Security Target Identification Title Comex Smart Card Reader KT2USB BioSec Reader Security Target Version 1 21 Status Release Date 2013 06 10 Sponsor Comex Electronics AB Developer Comex Electronics AB Keywords Security Target Common Criteria Smart Card Reader 1 2 TOE Identification The target of evaluation TOE is an advanced smart card reader having electrical interfaces to a smart card and a USB interface to a host PC The TOE exists in two product families and in three different versions within each product family e Comex KT2USB The Swedish Defence series o KT2USB U1 o KT2USB U2 o KT2USB STD e Comex BioSec Reader An export series o BioSec A o BioSec B o BioSec C The smart card readers have the following firmware and hardware versions and product article number Smart card Reader Hardware version Firmware version Product Article number KT2USB U1 P20355 05 KT2USBv1 00 17 X223001 02 KT2USB U2 P20356 04 KT2USB v1 00 17 X222001 01 KT2USB STD P20357 03 KT2USB v1 00 17 X221001 01 BioSec A P20355 05 BioSec v1 00 03 X423001 01 BioSec B P20356 04 BioSec v1 00 03 X422001 01 BioSec C P20357 03
21. TOE The target of evaluation TOE is an advanced smart card reader having electrical interfaces to a smart card and a USB interface to a host PC The TOE exists in two product families e Comex KT2USB The Swedish Defence series o KT2USB U1 o KT2USB U2 o KT2USB STD e Comex BioSec Reader An export series o BioSec A o BioSec B o BioSec C The smart card reader will allow a host PC to use the functionality of the smart card while protecting the smart card and the PIN By using the smart card reader the host PC will be able to use the security functionality of the smart card without having to divulge or handle the PIN or any other personal information in the host PC environment No personal information shall be stored about the persons using the smart card reader For this reason there are no users or even administrators known to the smart card reader However the smart cards are personal and therefore suitable for user authentication and digital signatures A smart card reader enables the usage of personal smart cards from the host PC This is done using functionality of the smart card reader the TOE and the smart card not part of the Version 1 21 Comex Electronics AB Page 7 54 TOE and a library on the host PC not part of the TOE The user interacts with the smart card reader by inserting the personal smart card reading display messages and entering the PIN to authenticate against the smart card and open it for servic
22. The result will be compared with the hash value computed from the message lf they are the same the digital signature has been verified Note that the smart card reader in this scenario is reading the fingerprint and is enabling the fingerprint matching that is performed on the smart card using a Match On Card functionality MOC However the smart card must already have been opened using the PIN and the smart card reader is not aware of any user identity in performing this operation The fingerprint matching operation performed by the smart card in conjunction with the smart card reader is only considered as a convenience and not as a security function For all smart card profiles used by the Swedish Defence that have non encrypted encryption keys stored in the SKS applet there is the emergency erase functionality available that can be triggered by the user from the smart card reader or via the host PC Fingerprint functionality The fingerprint functionality within the TOE consists of a fingerprint processor including a firmware and an attached fingerprint sensor At start up the TOE installs the firmware in the fingerprint processor Version 1 21 Comex Electronics AB Page 12 54 1 4 2 A user can use the TOE to administer fingerprints located on a smart card if the smart card profile includes this feature This includes registration store deletion and test of the stored fingerprints When a registration of a fingerprint is
23. a BioSec Card etc This command is only present in the KT2USB U1 version of the TOE Status bytes indicating an error are returned to the host PC when it is trying to send a blocked command TSF Protection The following security functions protect the integrity of the TSF data and ensure continued correct operation of the TOE TSF_SELFTEST Self testing TSF_FPT_2 a At start up the TOE runs a series of self test testing the keypad serial number EEPROM circuit and fingerprint processor The TOE also calculates a CRC checksum at start up and also during operation of the executable and compares it against a checksum calculated at the time of compilation If any of the tests fail the TOE will enter a secure mode where an error message is displayed for a few seconds before the TOE actively Version 1 21 Comex Electronics AB Page 45 54 erases user data and shuts down The buzzer will indicate the self test error with four short beeps b As part of its operation the TOE software also performs a set of security checks to ensure that the TOE is the correct security mode red yellow or black mode If such a check fails the TOE will enter a secure mode where an error message is displayed for a few seconds before the TOE actively erases user data and shuts down The buzzer will indicate the error with four short beeps This will happen for example if the software tries to read the keypad while the smart card reader is
24. aces to a smart card and a USB interface to a host PC The smart card reader KT2USB exists in three different versions each of them having a corresponding BioSec version All six versions are covered by this Security Target Version 1 21 Comex Electronics AB Page 18 54 Q n 3 5 o m lt Functionality co m m 3 3 3 E n N ha P H 2 9 2 x x x m a a Protection against Level U2 Level U1 Corr to Corr to compromising emanation FMV_ELEC FMV_ELEC level U2 level U1 Galvanic USB interface to host PC x A A A Fibre optical USB x x interface to host PC Emergency erasure KOP 5 x A Swedish Defence series X X X Export series X X X Table 6 Functionalities of the smart card reader A smart card reader enables the usage of smart cards and all the security features they bring to IT systems The user interacts with the smart card reader by inserting the smart card reading display messages and entering the PIN using a function key or putting his finger on the fingerprint sensor 1 4 7 Definition of the TOE The TOE is identical with the smart card reader and includes all the hardware and software elements making up the smart card reader The smart card reader is shown in the picture below indicating all the external interfaces KT2USB U1 KT2USB U2 and KT2USB STD and BioSec C BioSec A BioSec B 1 Fiber optical connection for KT2USB U1 6 Finger sensor and BioSec A Gal
25. ad pba A NES RAS ded oa bad ais 7 1 4 2 Product Features and Security FealureS ssssseeerssrrrrsserrrssrrrrssrrrrssrrrrssrrrrssrrr rear rr ennen nens 13 1 4 3 Intended Method Of USC orenat inn cid 14 1 4 4 Firmware separation Security modes ooooiooniniicinnnnccccnnneccccnnnacccnnn nr 15 1 4 5 lates Of OPeraliOn 2 25 ssz25h ac A A ATA RES AS SETS eae ere ied bee A 15 1 4 6 10 AA se a evap NRA O NAN RS RAA DAN Anns i ves AAA aa E REDARE a BABAR FAR 18 TAT Definition of the TOE rreren ie dene haces 19 1 4 8 Osers and Rolos ici ii dd 21 CC CONFORMANCE CLAIM occcconcccnnncconncccnnnncnnnnnnncr carrier 22 SECURITY PROBLEM DEFINITION ccccccccseeeeeseeeeeeeeeeeeeesseeeeeeeeeeeeeeseaesesneeeeeeeesseeseseaneneeeeeeones 23 3 1 ASSETS e dto og tala aa o in toy tra pe fo 23 3 2 THREATS NN 23 3 3 ASSUMPTIONS eaae oa 24 3 3 1 Intended usage Of the TOE siisii isdat riiieniaris ideis oaie asarini keai AA Aa ides ea Ra iaa AAA RR 24 3 4 ORGANIZATIONAL SECURITY POLICIES sssssoesenssossanossssnessessnnssnnsennnsneeesnassrestnnn dr ns enn nt rn error snar 24 A SECURITY OBJECTIVES i ssscsdt nsssssasonind stesnnsn ssans k sgnsnasensneksnsnark snassebi ns spn gnassdk esnrrn ssenssadtg 26 4 1 SECURITY OBJECTIVES FOR THE TOE c ccceecceceeeeeceeeeeeeeeceeeeeceaeeecaaeeeeeeeseeeeseaeeeeeeeeeneess 26 4 2 OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT 22 cceecceceeeeeseeeeeeeeeseeeeseaeeeeeeeeenees 26 4 3 SECURITY OBJECTIVE
26. agement functions emergency erase for anyone with access to the KT2USB version of the TOE Application Note Apart from any other user functions the user of the smart card reader is able to perform this is the only security relevant management function Upon use the KT2USB versions of the TOE must be able to immediately without delay erase symmetrical encryption keys and associated data stored on the smart card The TOE must also wait for acknowledgement from the smart card that the erasure has been completed The completion must be indicated to the user The smart card is reset after completed erasure Class FPT Protection of the TOE Security Functions FPT_FLS 1 Failure with preservation of secure state FPT_FLS 1 1 The TSF shall preserve a secure state when the following types of failures occur e self testing errors at start up e self testing error during operations Application Note Self testing during start up will check the components of the TOE and the integrity of the microcontroller while testing during operation will detect specific operational errors FPT_RCV 4 Function recovery FPT_RCV 4 1 The TSF shall ensure that stalling of the TOE firmware or any unexpected exceptions or interrupts have the property that the function either completes success fully or for the indicated failure scenarios recovers to a consistent and secure state Application Note Stalling of the firmware or any unexpected exceptions or interr
27. al keys stored on the smart card and displays the result of the operation After KOP has finished successfully or not the smart card reader enters connected state The figures below illustrate the relations between connected standalone KOP states and red yellow black security modes and the possible combinations of operating states and security modes Note An interface being enabled does not mean that it is being used The fingerprint sensor for instance does not capture a fingerprint every time the user puts his or her finger on the sensor only when the user is asked to place the finger on the sensor Version 1 21 Comex Electronics AB Page 16 54 Interfaces Connected black mode USB Enabled Function keys Enabled Digit keys Disabled Waiting for PC command or key press All other disabled Function key pressed PC command received Card inserted User leaves menu PC command executed Interfaces KOP finished USB Disabled Card inserted removed Interfaces USB Disabled Fingerprint Disabled Digit keys Disabled All other enabled Digit keys Enabled Fingerprint Enabled All other enabled PC orders PIN or fingerprint verification Connected yellow A E Connected red mode Executing PC commands Handling PINs or fingerpints PIN fingerprint processing finished or card is removed F1 pressed User leaves menu Me F1 pressed Fann prenged or card is inserted m KOP Finished rem
28. ance class augmented it with ALC_FLR 1 These augmentations are required by the customers for the TOE In addition to the security requirements coverage we have also identified all the dependencies to assure that no unresolved dependencies exists This is important since components may have defined dependencies on any component in any other family Only the extended requirements to the assurance level have been analysed for dependencies since all the assurance requirements in an assurance class already have all the dependencies resolved Security requirement Dependencies comment Resolved FDP_ETC 1 FDP_ACC 1 Subset access control or Yes FDP_IFC 1a FDP_IFC 1 Subset information flow control FDP_IFC 1a FDP_IFF 1a Simple security attributes Yes FDP_IFC 1b FDP_IFF 1b Simple security attributes Yes FDP_IFC 1c FDP_IFF 1c Simple security attributes Yes FDP_IFF 1a FDP_IFC 1a Subset information flow control Not FMT_MSA 3 FMT_MSA 3 Static attribute initialisation FDP_IFF 1b FDP_IFC 1b Subset information flow control Not FMT_MSA 3 FMT_MSA 3 Static attribute initialisation FDP_IFF 1c FDP_IFC 1c Subset information flow control Not FMT_MSA 3 FMT_MSA 3 Static attribute initialisation FDP_RIP 2 No dependencies Yes FMT_SMF 1 No dependencies Yes FPT_FLS 1 No dependencies Yes FPT_RCV 4 No dependencies Yes FPT_TST 1 No dependencies Yes Version 1 21 Comex Electronics AB Page 41 54 6 5 3 6 5 4 6 6
29. art card and the PIN It facilitates using smart cards for example for e strong authentication between the smart card and the host PC e digital signing of data on the host PC the host PC will send the data to be signed e reinforced login between the user associated with a smart card and a host PC Note that these are not the security functionality of the smart card reader but the functionality of the smart card together with the smart card reader and the host PC providing these services Usage of the TOE The TOE user is expected to be trustworthy and trained to use the smart card and the TOE in accordance with any existing security policies This includes using a correct smart card profile together with a specific version of the TOE in the CC evaluated configuration e Swedish Defence smart cards shall be used together with a KT2USB smart card reader e BioSec smart cards shall be used together with a BioSec smart card reader See section 1 4 1 for a complete list of all TOE versions and smart card profiles included in this ST The TOE user is also expected to know how to verify the seal and how to visually inspect the TOE for physical manipulation before using the smart card reader Version 1 21 Comex Electronics AB Page 14 54 Emergency erasure The user of a TOE belonging to the KT2USB series is expected to know when to perform emergency erasure of symmetrical keys if equipped with a smart card supporting this functio
30. c smart cards is used TOE Security Functional Requirements The following table shows the Security functional requirements for the TOE and the selection assignment and refinement operations performed on the components are indicated with bold text Iterations are identified by a letter after their unique component identification number in the head line of this component SFR class SFR Source Operations iter Ref ass sel FDP User FDP_ETC 1 CC Part 2 No No Yes No date protection Ene egaa CC Part 2 Yes No Yes No FDP_IFC 1b CC Part 2 Yes No Yes No FDP_IFC 1c CC Part 2 Yes No Yes No FDP_IFF 1a CC Part 2 Yes Yes Yes No FDP_IFF 1b CC Part 2 Yes No Yes No FDP_IFF 1c CC Part 2 Yes Yes Yes No FDP_RIP 2 CC Part 2 No No No Yes FMT FMT_SMF 1 CC Part 2 No No Yes No Specification of management functions FPT FPT_FLS 1 CC Part 2 No No Yes No Version 1 21 Comex Electronics AB Page 34 54 6 4 1 6 4 1 1 6 4 1 2 6 4 1 3 6 4 1 4 O of the FPT_RCV 4 CC Part 2 No I No Yes No FPT_TST 1 CC Part 2 No No Yes Yes CCR Comex CCR_IDE 1 Extended No No No No smart card Wee ees aaa o fla oii Wee reader functions CCR STA 1 Extended No No No No Table 14 TOE Security Functional Requirements Class FDP User Data Protection FDP_ETC 1 Export of user data without security attributes FDP_ETC 1 1 The TSF shall e
31. cal keys Since this is an emergency erase this must be possible to perform without first having to open the smart card A Seal The objective OE Seal ensures that the sealing label used on the TOE cannot be manipulated without the user being able to detect the manipulation A Tampering The objective OE Tampering ensures that the TOE environment provide the users with the means for detecting physical tampering that may affect the integrity of the TSF The objective OE User ensures that users of the TOE are appropriately trained for being able to detect the manipulation The objective OE Seal ensures that the sealing label used on the TOE cannot be manipulated without the user being able to detect the manipulation Table 11 Sufficiency of objectives holding assumptions The following rationale provides justification that the security objectives are suitable to cover each individual organizational security policy that each security objective that traces back to an OSP when achieved actually contributes to the implementation of the OSP and that if all security objectives that trace back to an OSP are achieved the OSP is implemented OSP Rationale for the security objectives P Emergency The product family KT2USB of the TOE must provide the users the means with an emergency erase O Emergency to immediately request the smart card to delete of all symmetric encryption keys stored on the smart
32. card The erasure shall be performed by the smart card OE Emergency without first having to open it i e without having to enter a PIN Version 1 21 Comex Electronics AB Page 29 54 P Commands P Residual The objective O Commands ensures that the product family KT2USB of the TOE is blocking all 1507816 PIN and fingerprint commands sent from the host PC to the smart card into the smart card reader when Swedish Defence smart cards are used The objective O Commands ensures that the product family BioSec Reader of the TOE is blocking all SO7816 PIN and fingerprint commands sent from the host PCs to the smart card into the smart card reader when BioSec smart cards are used The objective O Residual ensures that the user data is erased to protect against unauthorised access and reuse Table 12 Sufficiency of objectives enforcing Organizational Security Policies Version 1 21 Comex Electronics AB Page 30 54 5 Extended Components Definition Two extended components have been defined to cover specific functional requirements of the smart card reader not covered by any other functionality component of the CC The requirements CCR_IDE 1 and CCR_STA 1 cannot be easily modelled by the components of CC Part 2 because they define functionality that is very specific to the smart card reader 5 1 Class CCR Comex Card Reader The class Comex Card Reader CCR involves requirements for uniqu
33. card Blocking of PIN and fingerprint commands MI o o l PIN entry using reader keypad Change unblock PIN in reader menu Fingerprint menu and fingerprint signing Key overwrite procedure KOP Table 5 Available functionality in BioSec reader with different types of smart cards Note For the BioSec reader the Swedish Defence smart cards are recognized as ISO smart cards Note The KT2USB functionality for emergency erase of symmetrical keys KOP is not available in the BioSec Readers The BioSec smart card and the Swedish Defence smart cards have been designed to work with the BioSec smart card reader and the KT2USB smart card reader respectively and depend on these smart card readers for using some of their security functionality In the CC evaluated configuration these two smart card types must only be used in their respective smart card reader for acquiring all the available security features of the TOE For smart card profiles that have the PKCS 15 applet there are some main applications foreseen e Strong mutual authentication e Digital signing Strong mutual authentication The smart card reader connected to a host PC can be used for authentication between a user with a smart card and the host PC Users at host PCs may not necessarily have individually assigned host PCs A user is starting a communication program and the host PC is requesting the smart card to be inserted into the smart card reader The user after in
34. ccccnnarnncnnnons 27 Table 9 Mapping of security objectives for the environment to assumptions threats and policies 28 Table 10 Sufficiency of objectives countering threats nssmsssssssseerssssrsrsssrerrssrersssesr ss nana snar sn bsr nana narran 28 Table 11 Sufficiency of objectives holding ASSUMPTIONS ssmnssssesssssesrsssrersssrsrsssesr ss sees snar snaran narran 29 Table 12 Sufficiency of objectives enforcing Organizational Security Policies mssmmssssrsrsssrsrsssesrsssrrrnn 30 Version 1 21 Comex Electronics AB Page 4 54 Table 13 Table 14 Table 15 Table 16 Table 17 Table 18 Table 19 used Table 20 Table 21 Command DIOCKING srne sa tica lil letalidad lidad RAR AR 34 TOE Security Functional Requirement mimessssssrsssrersssrersssrersssrsrss sens ss sr sn sr sr nano rca nnn rca 35 Pre defined status information to security objectives snmssmmsssssssssesrsssrsrrssrersssrerss ser sr seen sn ars anna 39 Security Objectives Related to Security ReEequireMen tS sssmmmmssssseosrererrrssensnnrnrrrenrnnnrr nr rn enn nn 40 Security Functional Requirements Related to Security Objectives ss sssssssrsssoorssseessssrnn nn 41 SFR dependency analysis oeiras cr 42 PIN and fingerprint commands supported by the TOE when a corresponding smart card is BioSec Reader with a BioSec Card etc oooococcinoccccconoccccconancccnononcncnnnancccnnnnccc nano nncnnnnnnnccins 45 Security Objectives Related to Security RequireMen t
35. commensurate with one customer s requirements as stated in the PP FMVSCR Version 1 21 Comex Electronics AB Page 42 54 7 1 1 1 7 1 1 2 7 1 1 3 TOE Summary Specification This section presents a functional overview of the TOE the security functions implemented by the TOE and the Assurance Measures applied to ensure their correct implementation TOE Security Functions User data protection The following security functions protect the user data against unauthorised inspection and modification TSF_ERASE User data erasure TSF_FDP_2 and TSF_FDP_3 The TOE only stores user data in volatile memory RAM or CPU registers inside the microcontroller This means that a power loss will destroy all user data In case of an unexpected power loss the hardware is designed so that the power capacitors in the TOE will discharge rapidly thereby clearing all volatile memory within milliseconds The TOE actively erases all user data stored in memory as soon as the data has been processed and is no longer needed During shutdown all buffers containing PIN or fingerprint data are actively erased before the power is turned off The TOE resets the smart card if the Rx signal Rx receive data signal in the fibre optical interface is lost only KT2USB U1 version and BioSec A version This will reset the PIN status for all previously entered PINs The user must re enter PINs to be able to use smart card functionalities protected by a PIN
36. d and the results of PIN and fingerprint commands If a smart card is inserted removed the host PC is notified The TOE also indicates to the host PC when the TOE is shut down 7 2 The TOE Summary Specification Rationale The following tables provide a mapping between security functions and security functional requirements Security Functional Addressed by Rationale Requirement Security Function FDP_ETC 1 TSF_DATAFLOW All external communication is handled by the FDP_IFC 1a microcontroller by operating either in black FDP IFC 1c yellow or red mode only thereby enforcing FDP IFF 1a the NFLOW and UDFLOW data flow policies FDP_IFF 1c FDP_IFC 1b TSF_CBLOCK Blocking of 1507816 PIN and OT fingerprint FDP_IFF 1b commands will ensure that the TOE is in the correct security mode red mode before executing these commands Version 1 21 Comex Electronics AB Page 46 54 FDP_RIP 2 FDP_IFC 1a FDP_IFF 1a FDP_IFC 1c FDP_IFF 1c FMT_SMF 1 TSF_ERASE TSF_EMERGENCY The microcontroller is enforcing this by resetting all data storage for user data as soon as possible when the user data is processed and no longer needed and by using volatile memory that is erased when the microcontroller is shutdown The PIN validation status is reset if the connection to the host PC is lost By using the function key F1 the user will be able to trigger a key erase on smart cards that contain encryption keys The succ
37. e identification of the smart card reader at the host PC interface and to present status indication to the user The host PC can determine the version of the attached smart card reader leaving it to the host PC to determine if the attached version of the TOE is approved The functionality to present status enables the user to interact with the TOE CCR Comex Card Reader CCR_IDE Identification CCR_STA Status Figure 5 Class Comex Card Reader decomposition diagram 5 1 1 Comex Card Reader Identification CCR IDE Family Behaviour This family defines requirement for unique identification of the smart card reader at the host PC interface Component levelling CCR_IDE Comex Card Reader Identification 1 Management CCR_IDE 1 There are no management activities foreseen Audit CCR_IDE 1 There are no audit events foreseen 5 1 1 1 CCR_IDE 1 Presenting the type ID to the host PC Hierarchical to No other components Dependencies No dependencies CCR_IDE 1 1 The TOE must present the version identification ID number to the host PC to which it is connected The ID must be unique to the security specifics of Version 1 21 Comex Electronics AB Page 31 54 5 1 2 1 the smart card reader to ensure that a smart card reader with less security functionality is not being used Application Note The vendor must specify how this is being presented and that these IDs are unique to each specific model This must ensure
38. e status normal T13 rfu future use T14 90 T15 00 Table 3 The ATR for the BioSec smart cards Functionality with different types of smart cards The smart card reader has specific functionality that only works in conjunction with certain smart cards profiles such as emergency erase and fingerprint matching However the smart card reader is a general purpose smart card reader for any smart card is following the standards ISO 7810 ISO7810 and ISO 7816 1 4 SO7816 and in accordance with the protocol T 0 as specified in ISO7816 The following table show which features the KT2USB smart card reader series allows for different smart card types Commands from the host PC to the smart Xx Xx X X X X X card Blocking of PIN and x x x x x x fingerprint commands PIN entry using reader x x xX Xx X keypad Version 1 21 Comex Electronics AB Page 10 54 Fingerprint menu and fingerprint signing Change unblock PIN in reader menu Key overwrite procedure KOP A x X Table 4 Available functionality in KT2USB with different types of smart cards The availability of functionality depends on the profile used on the smart card Note For the KT2USB reader the BioSec smart card is recognized as an ISO smart card The following table show which features the BioSec smart card reader series allows for different smart card types Functionality BioSec Card Be x x Commands from the host PC to the smart
39. ect print Avtryck 1 Print 1 V lj avtryck Select print Avtryck 2 Print 2 Avtryck 1 Print 1 Ej registrerat Not registered Avtryck 2 Print 2 Not registered Ers tt avtryck OK Ja CLR Nej Replace print OK Yes CLR No Felaktig korttyp PIN inmatning Pin entry Avbruten Aborted Inget kort No card N dradering Emergency erase Wrong card type Kommunikations fel Communication error N dradera Emergency erase OK Ja CLR Nej OK Yes CLR No Vanta Wait Nycklar raderade Keys erased Nyckelfil Key file ej atkomlig not accessible Nyckelradering Key erasing misslyckades failed Krybet fil Krybet file ej tkomlig not accessible Krybet radering misslyckades Krybet erasing failed N dradering Emergency erase Avbruten Aborted Satt i kort Insert card Version 1 21 Comex Electronics AB Page 53 54 Kort isatt Card inserted Kort ok nt Card unknown Kort aktiverat Card activated Kort felaktigt Card error Kort l st Card blocked Fel Error L s upp Unblock 1 PIN ANV 1 PIN USER PIN ANV ej PIN USER not blockerad blocked PIN ANV uppl st PIN USER unblocked PIN ANV sp rrad Uppl sn kod fel 2 f rs k kvar PIN USER locked Unbl code wrong 2 attempts left Uppl sningskod kkkkkkkk Unblocking code kkkkkkkk Exception Exception Id 54 Id 54 Adr 234567 Adr
40. eeeseeeeseaeeeeeeenenees 39 6 5 1 Security Requirements COVEraQl sssererssrrrrsserrrssrsrrssrsrrssrrrrssrnrss rra 39 6 5 2 Security Requirements Sufficiency and Dependency Analysis ooonnoccconnncccnoniccccinnanncccnn 41 6 5 3 Unresolved DependenCIiOS ssesseerrrrrrrenarnrrrrrrrenarnrrrrr rr enar nr ns rr aren ann ARR ARR RAR RAKA RR RBK RR RAK rn or 42 6 5 4 Justification for Explicitly Stated IT Security Requirements mnm ssseseeesssrrrssrrrsssrssssrsssn 42 6 6 TOE SECURITY ASSURANCE REQUIREMENTS asussressrrsrsrersrersrerererener enn sn r sn rs r sn rr snar ran ann 42 6 7 SECURITY ASSURANCE REQUIREMENTS RATIONALE aossasesrsssssssrsssrsssrsssrsssrss aren srrssrrr noen noen nr anna 42 7 TOE SUMMARY SPECIFICATION sssssnsssssssssssnsssnnssnnrsnsrsnnrnsnrns cancer 43 7 1 MOE SECURITY FUNCTIONS da iati ise rindiera b s das nns nan B RA ia 43 7 1 1 User data protection der idles cheated atc ate easier 43 7 1 2 ESF Protec cir ates ee ea r ERNA rn 45 7 2 THE TOE SUMMARY SPECIFICATION RATIONALE ccccooccococccononcconcnccnncnnnnnononnccnnnnnnannnnnnnncnnncnnns 46 Bin REFERENCES 000 yntcensetuedaccentcc aceeeesacedectecrentesceetevderth 48 9 ABBREVIATIONS AND DEFINITIONS ooococoncccocccccnnccconnncnnnnnnnnnccnnnn cnn nana recrear recen 49 APPENDIX A PRE DEFINED STATUS INFORMATION sassasssssssssssssnssnnnsnnnsnnnsnnnsnnnsnn nns nn sn nr rn nr nn nn nn nn nn 50 Figures Figure 1 Examples of distinct areas on a finger s ssmsussssssssrsssssrsrsss
41. es Although mobile only one specific smart card reader is supposed to be used for each host PC It is assumed that the host PC will be able to identify that the right type of smart card reader is connected The smart card reader is primarily intended to be used in conjunction with a smart card as described in protection profile PP FMVSC Differences between the smart card reader families There are two areas where there are differences in the firmware between the KT2USB series and the BioSec series e The detection of smart card profiles differs e Functionality to erase symmetrical encryption keys A few smart card profiles used together with the KT2USB smart card readers have a specific storage for symmetrical encryption keys Therefore the KT2USB smart card readers are required to be able to perform an emergency erasure of the symmetrical encryption keys Since the smart card profiles used together with the BioSec smart card readers do not have this functionality the emergency erasure functionality is not present within the BioSec smart card readers Detection of smart card profile When a smart card is powered on by the smart card reader it returns a string of bytes called ATR Answer To Reset SO7816 It contains information about the smart card chip functionality as well as the smart card profile The smart card reader distinguishes between the following types of smart card profiles e KT2USB series o Swedish Defence smart
42. ess or failure of this will be displayed to the user FPT_FLS 1 TSF_SELFTEST TSF_WATCHDOG In case of self test errors operational errors or any errors detected by the watchdog the TOE will reset itself and erase all user data from the smart card reader FPT_RCV 4 TSF_WATCHDOG The Watchdog will upon detection of an error condition reset the microcontroller which will erase all user data in the smart card reader FPT_TST 1 TSF_SELFTEST The self tests are performed at start up and during operation CCR_IDE 1 TSF_ID At start up the TOE will present its model ID to the host PC and also show it on the display to the user CCR_STA 1 TSF_STATUS The TOE displays the status of the inserted smart card and the results of PIN and fingerprint commands The status indication on the display informs the user if an error has occurred within the TOE The user is informed of a self test failure by a status message on the display The result of the emergency erase operation is presented on the display Table 20 Security Objectives Related to Security Requirements Version 1 21 Comex Electronics AB Page 47 54 8 References ISO2449 ISO7810 CC CCG CCID FMV_ELEC IS019794 2 ISO7810 ISO7816 ISO7816 1 ISO7816 2 ISO7816 3 ISO7816 4 PKCS 15 PP FMVSC PP FMVSCR USB ICC ISO IEC JTC 1 SC 27 N 2449 Information technology
43. f the following instructions e PIN and fingerprint related commands sent from the host PC e When the user enters the menu system by pressing OK Up or Down e When F1 emergency erasure is pressed The fingerprint sensor and digits 0 9 on the keypad is only enabled in Red Mode When the user leaves the menu system the TOE resets the smart card If the instruction does not require a switch to Red Mode the instruction is performed in Yellow Mode This includes sending commands to the smart card except PIN and fingerprint related commands Before switching back from Red to Yellow all buffers used for storage of PINs and fingerprint data are actively erased These are the different data flows in the TOE e Host PC Microcontroller lt gt smart card PC Command and SC Command All commands and data to and from the smart card except PIN and fingerprint related commands are directly and unmodified transferred to the smart card via the microcontroller e Keypad Microcontroller smart card PINs given at the keypad are directly and unmodified transferred to the smart card via the microcontroller e Fingerprint sensor gt Fingerprint processor Microcontroller gt smart card Fingerprints read at the Fingerprint sensor are sent to the Fingerprint processor where they are processed and then transferred via the microcontroller to the smart card for verification e Microcontroller gt Display The microcontroller con
44. he information flow control UDFLOW SFP on SC_Commands commands and answers sent between the smart card and the TOE and PC_Commands commands and answers sent between the TOE and the host PC Application Note SC_Commands must only be sent by the microcontroller to the smart card via the smart card interface and from the smart card to the microcontroller via the smart card interface The information is represented by command and response data sent to and from the smart card and the operation is to only let the command and response data be accessible at the smart card interface and in the microcontroller PC_Commands must only be sent by the host PC to the microcontroller via the USB interface and from the microcontroller to the host PC via the USB interface The information is represented by command and response data sent to and from the TOE and the operation is to only let the command and response data be accessible at the microcontroller of the TOE and at the USB interface Version 1 21 Comex Electronics AB Page 35 54 6 4 1 5 6 4 1 6 6 4 1 7 FDP_IFF 1a Subset information flow control FDP_IFF 1 1a The TSF shall enforce the information flow control NFLOW SFP based on the following types of subject and information security attributes the external interfaces of the TOE FDP_IFF 1 2a The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following
45. ied through an internal connector b Physically designed to prevent access to internal modules of the TOE using a seal to prevent undetected manipulation of the TOE This is not however in the scope for this Common Criteria Evaluation and therefore not part of the evaluated TSF c Protection against compromising emanations not KT2USB STD and BioSec C certified by an independent laboratory This is not however in the scope for this Common Criteria Evaluation and therefore not part of the evaluated TSF d The TOE has three security modes Black Yellow and Red mode together with corresponding source code separation The USB interface available in black mode is disabled before processing sensitive user data which means separation between sensitive and non sensitive operations within the TOE e Erase all user data after processing A power loss will rapidly destroy all user data since it is stored in volatile memory f At start up the TOE runs a series of self test to ensure the correctness of operation The TOE also calculates a CRC checksum of the executable and compares it against a Version 1 21 Comex Electronics AB Page 13 54 1 4 3 reference checksum The CRC checksum is also calculated and checked during operation of the TOE The TOE displays the software version number at start up As part of its operation the TOE software also performs a set of security checks to ensure that the security functions are working
46. inger Fel l gg p igen H ger pekfinger R index finger Avtryck ej l st Error place again Print not read Byt Change 1 PIN ANV 1 PIN USER PIN ANV PIN USER blockerad blocked Ange PIN ANV Enter PIN USER PIN ANV Fel PIN USER Error 2 f rs k kvar 2 attempts left Kort felaktigt Card error The TOE includes the following pre defined information texts to be presented on the display Comex Electronics AB Page 50 54 Avbruten Aborted Ange ny PIN kkkkkkkk Enter new PIN kkkkkkkk Upprepa ny PIN kkkkkkkk Repeat new PIN kkkkkkkk Uppl sningskod kkkkkkkk Ny PIN ANV New PIN USER felaktig incorrect Ny PIN ANV OK New PIN USER OK Byt PIN Change PIN Avbruten Aborted PIN ANV PIN USER sp rrad locked Unblocking code kkkkkkkk PIN ANV ej PIN USER not blockerad blocked Avtryck 1 Print 1 OK OK Avtryck 2 Print 2 OK OK Avtryck 1 Print 1 blockerat blocked Avtryck 2 Print 2 blockerat blocked V lj VA Choose PIN SIGN PIN SIGN V lj VAN Choose Fingeravtryck 1 Fingerprint 1 V lj VAN Choose Fingeravtryck 2 Fingerprint 2 Signering Signing Avbruten Aborted PIN ANV uppl st PIN ANV sp rrad PIN USER unblocked PIN USER locked Uppl sn kod fel 2 f rs k kvar Unbl code wrong 2 attempts left PIN inmatning Pin entry avbruten aborted L s upp PIN Unblock PIN Avbruten Aborted
47. ion to the host PC is lost external power not via the USB interface FDP_RIP 2 For the KT2USB U2 KT2USB STD BioSec B and BioSec C versions of the TOE the TOE is powered off if the connection to the host PC is lost powered via the USB interface FDP_RIP 2 Version 1 21 Comex Electronics AB Page 39 54 O Leakage O Tampering FDP_ETC 1 FDP_IFC 1a FDP_IFF 1a FPT_TST 1 CCR_STA 1 The TOE meets the security objective by enforcing the NFLOW SFP ensuring that PIN PUK and fingerprint data will only be transmitted to the smart card interface The TOE meets the security objective by ensuring that logical tampering is detected by the self tests The user is informed of a self test failure by a status message on the display see number 4 and 14 15 in table 15 O Malfunction FPT_FLS 1 FPT_RCV 4 FPT_TST 1 CCR_STA 1 The TOE meets the security objective by addressing the security requirements regarding the use of self tests and the entering of a secure state when failures occur or if the firmware is stalled The status indication on the display informs the user if an error has occurred within the TOE see number 1 5 and 14 15 in table 15 O Substitute CCR_IDE 1 The TOE meets the security objective by ensuring that the TOE sends an ID that is unique for each type of TOE O Emergency O Commands FMT_SMF 1 CCR_STA 1 FDP_IFC 1b FDP_IFF 1b The KT2USB versions of the TOE meets the
48. l requirements Version 1 21 Comex Electronics AB Page 36 54 6 4 1 8 6 4 2 6 4 2 1 6 4 3 6 4 3 1 6 4 3 2 6 4 3 3 Application Note The external interfaces of the TOE are presented in Figure 4 FDP_RIP 2 Full residual information protection FDP_RIP 2 1 The TSF shall ensure that any previous information content of a resource is made unavailable upon the de allocation of the resource from all objects Application Note The smart card reader must actively erase all user data such as PINs fingerprint data and data entered into the TOE and transferred to and from the TOE and the smart card as soon as it has been processed and is no longer needed Erasure of all user data will also happen in case of TOE reset or power failure The TOE resets the smart card if the Rx signal Rx receive data signal in the fibre optical interface is lost only KT2USB U1 version and BioSec A version This will reset the PIN status for all previously entered PINs The user must re enter PINs to be able to use smart card functionalities protected by a PIN The TOE versions KT2USB U2 KT2USB STD BioSec B and BioSec C are powered through the USB interface Removing these versions of the TOE from the host PC will result in a shutdown and loss of all data and PIN status Class FMT Specification of Management Functions FMT_SMF 1 Specification of Management Functions FMT_SMF 1 1 The TSF shall be capable of performing the following man
49. n of the Smart Card Reader Malfunction of the TOE may arise from spontaneous hardware or software errors This may modify or bypass the security mechanisms within the TSF possibly displaying user data Assumptions The TOE is assured to effectively provide the intended security measures when installed managed and used in accordance with the documentation for the use of the evaluated configuration The TOE environment must satisfy the following assumptions Intended usage of the TOE A User The TOE User is trustworthy and trained to use the smart card and the TOE in accordance with any existing security policies This includes that the user knows how to verify the seal before using the smart card reader and knows when to perform emergency erase if equipped with such a smart card but also to use Swedish Defence smart cards and BioSec cards only in their respective smart card readers A Substitute The host PC has the means to check the identity of the smart card reader so that a substitution to another approved model of the smart card reader can be detected A Emergency The Swedish Defence smart cards used for storing specific symmetrical encryption keys have the capability of emergency erase which means erasure of symmetrical encryption keys without first having to open the smart card with a PIN A Seal The sealing label used to seal the TOE cannot be broken or removed and re attached without the user being able to detect the
50. nality see table 4 Since the smart card profiles used together with the BioSec smart card readers do not have this functionality the emergency erasure functionality is not present within the BioSec smart card readers The host PC environment The host PC is expected to have the means to check the identity of the TOE so that a substitution of the reader can be detected For achieving full functionality within a host PC specific drivers should be used together with the TOE The security of the TOE however does not rely on any functionality within the environment such as a driver or an operating system There are currently drivers available for Windows and Linux Unix platforms The KT2USB smart card reader is designed to be used within all of the Swedish Defence to improve the security of IT applications The potential uses will span a wide range of IT and telecommunication environments within the Swedish Defence Within the Swedish Defence each smart card reader will be used only in a dedicated environment meaning a limited set of users all having the same clearance The BioSec smart card reader is designed to be used within organisations requiring a high level of security in IT and telecommunication environments such as PKI environments 1 4 4 Firmware separation Security modes In order to achieve the intended level of security within the TOE the firmware execution of the smart card reader has been divided into three operating m
51. nforce the information flow control NFLOW SFP when exporting user data controlled under the SFP s outside of the TOE FDP_ETC 1 2 The TSF shall export the user data without the user data s associated security attributes Application Note The assets being exported by the TOE are the PINs PUKs and fingerprint data that are exported from the TOE to the smart card using the smart card interface FDP_IFC 1a Subset information flow control FDP_IFC 1a 1 The TSF shall enforce the information flow control NFLOW SFP on PIN PUK and fingerprint data entered into the TOE by the user Application Note PIN PUK and fingerprint data must only be sent by the microcontroller to the smart card interface and to no other interface such as the USB interface The subjects are representing by the interfaces keypad and fingerprint sensor information are representing by the PIN PUK and fingerprint data and the operation is to only let the information be accessible at the smart card interface of the TOE FDP_IFC 1b Subset information flow control FDP_IFC 1b 1 The TSF shall enforce the information flow control CBLOCK SFP on PIN PUK and fingerprint commands to be sent from the host PC to the smart card Application Note The commands being blocked are the I SO7816 commands that are identified as PIN PUK and fingerprint commands sent from the host PC to the TOE FDP_IFC 1c Subset information flow control FDP_IFC 1c 1 The TSF shall enforce t
52. nitiated from the smart card reader and without first having to open the smart card OE Seal The sealing label used to seal the TOE cannot be broken or removed and re attached without the user being able to detect the manipulation OE Tampering The TOE environment must provide the means for the user to detect physical tampering that may affect the integrity of the TSF 4 3 Security Objective Rationale 4 3 1 Security objectives coverage The following table provides a mapping of TOE objectives to threats and policies showing that each objective counters or enforces at least one threat or policy respectively Objective Threats OSPs O Residual T Residual P Residual O Leakage T Leakage O Tampering T Tampering O Malfunction T Malfunction O Substitute T Substitution O Emergency P Emergency O Commands P Commands Table 8 Mapping of TOE security objectives to threats and policies The following table provides a mapping of the objectives for the Operational Environment to assumptions threats and policies showing that each objective holds counters or enforces at least one assumption threat or policy respectively Objective Assumptions Threats OSPs OE User A User A Tampering T Tampering OE Substitute A Substitute T Substitution OE Emergency A Emergency P Emergency OE Seal A Seal A Tampering T Tampering OE Tampering A Tampering T Residual Versi
53. odes and corresponding source code separation The use of different operating modes minimizes the interface displayed to the host PC that could be used by a potential attacker The three security modes are e Black mode The black mode is the initial state of the TOE and it is active when communicating with the host PC The black mode only contains the USB functionality and very limited means of communicating with the yellow mode source code e Yellow mode In yellow mode host PC commands except PIN and fingerprint related commands are executed During this time the USB interface to the host PC is disabled e Red mode In red mode PINs and Fingerprints may be retrieved from the user and processed During this time the USB interface to the host PC is disabled 1 4 5 States of operation The smart card reader has two main use cases connected and standalone state When the reader starts up it enters connected mode after having successfully performed the self tests o Connected state PC commands In connected state the smart card reader executes commands issued by the host PC In most cases the host PC asks the reader to issue a command to the smart card and then return the result to the host PC Version 1 21 Comex Electronics AB Page 15 54 when no command demanding user interaction is executed a standby message consisting of smart card status information is shown on the display If the user presses an arrow key or the OK ke
54. oduct family KT2USB of the TOE must be able to provide the user with the ability to trigger and verify an emergency erase of all the symmetrical encryption keys and associated data stored on the smart card O Commands The product family KT2USB of the TOE must for all versions of Swedish Defence smart cards block all 1507816 PIN and fingerprint commands sent from the host PC interface to the smart card The product family BioSec Reader of the TOE must for all versions of BioSec smart cards block all 1507816 PIN and fingerprint commands sent from the host PC interface to the smart card Objectives for the Operational Environment OE User The TOE User is trustworthy and trained to use the smart card and the TOE in accordance with any existing security policies This includes that the user knows how to verify the seal before using the smart card reader and knows when to perform emergency erase if equipped with such a smart card but also to only use Swedish Defence smart cards and BioSec cards in their respective smart card readers OE Substitute The host PC has the means to check the identity of the smart card reader so that a substitution of the reader can be detected OE Emergency Version 1 21 Comex Electronics AB Page 26 54 The Swedish Defence smart cards must if it can contain specific symmetrical encryption keys be able to erase all symmetrical encryption keys stored on the smart card This must be possible to be i
55. ofile Draft Version 1 0 October 3 2000 USB ICC ICCD Rev 1 0 Smart Card USB Integrated Circuit s Card Devices Version 1 21 Comex Electronics AB Page 48 54 Abbreviations and definitions AID Application Identifier ATR Answer To Reset BioSec Name for all three different versions of BioSec reader BioSec A A version of BioSec reader that together with a host PC includes protection against compromising emanations according to level U1 FMV_ELEC The interface to the host host PC is fibre optical USB BioSec B A version of BioSec reader that together with a host PC includes protection against compromising emanations according to level U2 FMV_ELEC The interface to the host PC is galvanic USB BioSec C A version of BioSec reader that do not include protection against compromising emanations The interface to the host host PC is galvanic USB This is the commercial off the shelf version CC Common Criteria KT2 The present version of Comex KT2 KT2USB Name for all three different versions of KT2 USB KT2USB STD A version of KT2 USB that do not include TEMPEST protection The interface to host PC is galvanic USB KT2USB U1 A version of KT2 USB that include TEMPEST protection according to level U1 The interface to host PC is optical USB KT2USB U2 A version of KT2 USB that together with a host PC include TEMPEST protection according to level U2 The interface to host PC is galvanic USB OT Oberthur Technologies the manufactu
56. on 1 21 Comex Electronics AB Page 27 54 T Tampering Table 9 Mapping of security objectives for the environment to assumptions threats and policies 4 3 2 Sufficiency The following rationale provides justification that the security objectives are suitable to counter each individual threat and that each security objective tracing back to a threat when achieved actually contributes to the removal diminishing or mitigation of that threat Threat Rationale for the security objectives T Residual By clearing all user data after use O Residual access by any other user to such information should not be possible Changes to the TSF must require opening the TOE to gain access to the internal components of the TOE OE Tampering T Leakage By restricting the information flow of the PIN PUK and fingerprint data to the smart card interface O Leakage of the smart card reader leakage of such information should not be possible T Tampering Changes to the TSF must require opening the TOE to gain access to the internal components of the TOE OE Tampering Opening the TOE must require breaking the seal OE Seal This must be detectable by the trained users OE User but also via the self testing that will check the integrity of the TSF O Tampering T Substitution The TOE provides the means to identify a substituted smart card reader O Substitute A substituted reader can be identified by the host PC OE Substit
57. onality Each threat is named and is followed by a one line description and by an application note which supplies additional information and interpretation T Residual Exploiting residual information An attacker may gain access to user data from previous use of the TOE such as PINs and data entered into the TOE and transferred to and from the TOE and the smart card by for example having access to using or dismantling the smart card reader T Leakage Information leakage An attacker may gain access to PIN PUK or fingerprint data through leakage outside of the smart card reader to any other external interface such as the USB interface T Tampering Tampering of the Smart Card Reader An attacker may alter the TSF to modify or bypass the security mechanisms for example to gain fraudulent access to user data This may be done by manipulating or replacing some components in the TOE or by using external interfaces such as the USB or the smart card interface to manipulate or replace the TOE firmware or influence its operations Version 1 21 Comex Electronics AB Page 23 54 3 3 3 3 1 3 4 T Substitution Substitution of approved models of the Smart Card Reader A user may replace the TOE by similar equipment that is not authorized for this specific use and thus leak user data for example equipment without protection against compromising emanations when such protection is required T Malfunction Malfunctio
58. ontained within the microcontroller chip itself The TOE has three operating modes and corresponding source code separation The use of different operating modes minimizes the interface displayed to the host PC that could be used by an attacker This separation will also facilitate the examination and verification of the security functionalities within the TOE The three security modes are Version 1 21 Comex Electronics AB Page 43 54 e Black mode e Yellow mode e Red mode The Black mode is the initial state of the TOE and it is active when communicating with the host PC The Black mode only contains the USB functionality and very limited means of communicating with the Yellow mode source code as described below The intention of separating the USB functionality in a specific security mode Black mode and hereby introducing the additional Yellow mode is to minimize the availability to internal resources such as display from the external USB interface displayed by the TOE The TOE resides in Black mode at rest The following actions will result in a switch of the security mode to Yellow mode e A command is received via the USB interface e One of the function keys is pressed F1 Arrow up down or OK resulting in entering the menu system e Asmartcard is inserted or removed When initiated the Yellow mode checks the event structure for type of instruction A switch from Yellow mode to Red mode is performed if it is one o
59. ormation flow based on the following rules allow the command ISO 7816 Verify PIN CLA Any INS 20h when Lc 0 FDP_IFF 1 5b The TSF shall explicitly deny an information flow based on the following rules no additional requirements Application Note The CBLOCK information flow control SFP is to protect the smart cards against specific types of requests from the host PC Since this CBLOCK SFP only applies for smart card not identified as ISO smart cards it is essential that the appropriate smart card readers are used for the specific smart cards as stated in A USER and OE USER FDP_IFF 1c Subset information flow control FDP_IFF 1 1c The TSF shall enforce the information flow control UDFLOW SFP based on the following types of subject and information security attributes the external interfaces of the TOE FDP_IFF 1 2c The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold PC_Commands and SC_Commands are only flowing between the TOE microcontroller and the USB interface or the TOE microcontroller and the smart card interface of the TOE respectively FDP_IFF 1 3c The TSF shall enforce no additional requirements FDP_IFF 1 4c The TSF shall explicitly authorise an information flow based on the following rules no additional requirements FDP_IFF 1 5c The TSF shall explicitly deny an information flow based on the following rules no additiona
60. ost PC and the smart card to perform the mutual authentication by providing the smart card a secure environment for PIN entry However if the smart card is removed from the smart card reader the smart card reader will signal to the host PC that the smart card has been removed so that the host PC may interrupt the session Digital signing A user sending e mail wants the receiver to be able to verify the origin and that the content has been unchanged since it was sent The sender will therefore sign the message The sender is asked to place the finger on the fingerprint reader In doing so the message will be signed and submitted The receiver chooses the command verify and will then receive confirmation if the sender can be verified and if the content of the message has been unchanged since it was signed Also in this scenario all the steps of the processing and transmission are hidden for the user When the user has chosen the function sign the hash value of the message is calculated on the host PC This hash value will be sent to the smart card for signing using the private key of the user The result of the signature will be returned to the host PC and will be added to the message In doing this a digital signature has been created When the recipient has received the message he will select the command verify to perform an asymmetrical key calculation of the digital signature using the corresponding public key of the sender
61. oved or card is removed KOP red mode Key overwrite Standalone red mode Menu system F1 pressed Interfaces USB Disabled ge Digit keys Enabled Digit keys Enabled Fingerprint Enabled Fingerprint Enabled All other enabled All other enabled Figure 2 Modes of operation for KT2USB reader Version 1 21 Comex Electronics AB Page 17 54 Interfaces USB Enabled Function keys Enabled Digit keys Disabled Connected black mode Waiting for PC command or key press All other disabled Function key pressed PC command received Card inserted User leaves menu PC command executed Interfaces KOP finished USB Disabled Card inserted removed Interfaces USB Disabled Fingerprint Disabled Digit keys Disabled All other enabled Digit keys Enabled Fingerprint Enabled All other enabled PC orders PIN or fingerprint verification Connected yellow A F Connected red mode Executing PC commands Handling PINs or fingerpints PIN fingerprint processing finished or card is removed User leaves menu Function key pressed or card is inserted removed Standalone red mode Menu system Interfaces USB Disabled Digit keys Enabled Fingerprint Enabled All other enabled Figure 3 Modes of operation for BioSec Reader 1 4 6 Product Type The target of evaluation TOE for this security target is an advanced smart card reader having electrical interf
62. performed certain characteristics are extracted from the fingerprint placed on the fingerprint sensor using a Distinct Area Detection DAD algorithm implemented in the fingerprint processor Together with their geometric relationship these characteristics form a template that is unique for every fingerprint It is the templates that are stored in the smart card two templates for every fingerprint 3 EN SI Figure 1 Examples of distinct areas on a finger When a verification of a fingerprint is performed the users fingerprint is captured by the fingerprint sensor to the fingerprint processor The characteristics are extracted using the same DAD algorithm and sent to the card for matching against the stored templates of the selected fingerprint Product Features and Security Features The general features of the smart card reader are 1 Read any smart card conforming to ISO 7810 ISO7810 and ISO 7816 1 4 ISO7816 and in accordance with T 0 The TOE is equipped with a keypad consisting of numerical keys and 6 function keys The TOE is equipped with a fingerprint sensor Once the smart card has been opened with the PIN the fingerprint sensor may activate specific functions of the smart cards supporting this functionality 4 The TOE is portable to easily permit mobile use The security features of the product are a The TOE software resides in Flash memory inside the microcontroller which can only be read or modif
63. re of the Swedish Defence and BioSec smart cards PIN Personal Identification Number see also PUK ISO7816 PKCS 15 A Java applet stored on some of the Swedish Defence and BioSec smart cards This applet contains the file system according to the PKCS 15 standard This is used for PKI purposes PKI Public Key Infrastructure PUK Personal Unblocking Key This is a special PIN used for unblocking other PINs on the smart card ISO7816 SKS Secret Key Storage a Java applet stored on some of the Swedish Defence smart cards The applet contains secret encryption keys It is these keys that are erased during emergency erasure F1 key Version 1 21 Comex Electronics AB Page 49 54 Appendix A Pre defined status information Swedish text English text Omstart Watchdog Restart Watchdog Omstart vriga fel COMEX KT2USB U1 Restart Unknown error COMEX KT2USB U1 V1 00 10 V1 00 10 Sjalvtest fel Selftest failed Tangentbord Keyboard Press OK Press OK Sjalvtest fel Selftest failed Fingerprint Fingerprint Press OK Press OK Sjalvtest fel Selftest failed Kortlasar ID Reader ID Press OK Press OK Sjalvtest fel Selftest failed Checksumma Checksum Press OK Press OK Lagg pa finger Place finger H ger pekfinger R index finger L gg p igen Place again H ger pekfinger R index finger Testa Test H ger pekfinger R index finger Ta bort fingret Please remove f
64. serting the smart Version 1 21 Comex Electronics AB Page 11 54 card is now asked to type in the PIN on the keypad of the smart card reader A challenge a random number is being sent from the host system e g a server to the host PC The host PC may add some information and then sends it to the smart card for signature using the users private key on the smart card Since the private key on the smart card can only be used once the smart card has been unlocked with its PIN the user must enter the PIN on the keypad of the smart card reader The smart card will then perform the asymmetrical key calculation and return the result to the TOE which passes on the result to the host PC The host PC verifies the signature using the public key of the user The same thing happens the other way around i e the identification of the host system e g a server A random number is generated by the smart card or the host PC This random number will be sent to the host system e g a server after additional information has been added where it will be signed with the private key of the host system This signature will be returned to the host PC where the signature is being verified with the public key of the host system e g a server Both authentication procedures may occur in parallel Note that the smart card reader in this scenario is not aware of the user or the specific security operations performed as part of this scenario It only enables the h
65. ss OK Press OK 15 Assert fail Assert fail File id 08 File id 08 Line 234 Line 234 Press OK Press OK Table 15 Pre defined status information to security objectives Application Note The TOE must be able to ask the user for entering PIN on the keypad and the user placing a finger on the fingerprint sensor The TOE must be able to inform the user of smart card insertion removal information if the TOE malfunctions and the results from emergency erase PIN and fingerprint commands on the display See Appendix A for a more detailed list of pre defined status information 6 5 Security Functional Requirements Rationale 6 5 1 Security Requirements Coverage The following tables provide a mapping of the relationships of security requirements to objectives illustrating that each security requirement covers at least one objective and that each objective is covered by at least one security requirement Security Addressed by Rationale objective O Residual FDP_RIP 2 The TOE meets the security objective by ensuring FDP IFC 1a that all user data stored and processed within the FDP IFC 4 TOE are erased as soon as possible when no Se longer needed and that the user data only flows FDP_IFF 1a EDP IFF 1 to the correct external interface of the TOE ARENE FDP_RIP 2 FDP_IFC 1a FDP_IFC 1c FDP_IFF 1a FDP_IFF 1c For the KT2USB U1 and BioSec A versions of the TOE the PIN validation status is reset if the connect
66. ssrssnssr rss ss ann sr nns narco 13 Figure 2 Modes of operation for KT2USB reader ssssnmssssrsrrssrerrssrersssesrss sees snar snar sr Ra KR RAR KR RASA KR RAR Sn an 17 Figure 3 Modes of operation for BioSec Reader s ssmssesrrssrrrsssrerrssrersssrsr ss sens snar sn ss nsR RSA KR RAR KR RASA KR RASA Sn on 18 Figure 4 Description of the smart card reader interfaces smmsmmsssesrssssrerrssrerrssrsrrs sees ss sr sn rss sn Rans cnn 20 Figure 5 Class Comex Card Reader decomposition CiaOraM ssesesrsssrersssrerssseerssseer ss ser ss ser cnn sann 31 Tables Table 1 The hardware and firmware versions Of the TOE minsssssssssesssssesrssssrsrssseersssess anses rss ss sn sons sn seen ansa 6 Table 2 The ATR for the Swedish Defence smart Cards m esmmsssesrssssrerrssrerrssesrsssrer essens snar snaran nano nara 9 Table 3 The ATR for the BioSec smart CQlrCS sssosssssosssrsssssrsressssrssssssnsrssssa sars n sn an RAR KR RAKA ARR RR naar KR KR RA 10 Table 4 Available functionality in KT2USB with different types of smart CarOlS ssssssssrsrssseessssrnsnn 11 Table 5 Available functionality in BioSec reader with different types of smart CardS s 11 Table 6 Functionalities of the smart Card reader smuessssssesrsssrrrsssrerrssrersssrsr ss arr sn ser nr KSR AR RASA KR RASA KR RASA Kn as 19 Tabe 7 TOE UsermanualS cura lada ito tng Aria 20 Table 8 Mapping of TOE security objectives to threats and policies oooonocccinnnnicnnnnniccnnno
67. t processor and the microcontroller into the smart card reader is only flowing to the smart card interface of the TOE 6 2 The UDFLOW SFP The TOE enforces the information flow control policy UDFLOW meaning that Microcontroller lt gt smart card SC_Commands are only flowing between the TOE microcontroller and the smart card interface of the TOE Host PC lt Microcontroller PC_Commands are only flowing between the TOE microcontroller and the USB interface of the TOE 6 3 The CBLOCK SFP The TOE enforces the information flow policy CBLOCK that when specific smart card is used will block all SO7816 PIN and fingerprint commands coming in on the host PC interface to be sent to the smart card interface The product family KT2USB of the TOE will for all versions of Swedish Defence smart cards block all 1507816 PIN and fingerprint commands sent from the host PC interface to the smart card When other types of smart cards are used in these versions of the TOE no command blocking will be performed The product family BioSec Reader of the TOE will for all versions of BioSec smart cards block all SO7816 PIN and fingerprint commands sent from the host PC interface to the smart card When other types of smart cards are used in these versions of the TOE no command blocking will be performed The TOE identifies the type of smart card by the SO7816 ATR see and The following commands are blocked as described above see
68. that smart card readers cannot by mistake or intentionally being replaced in environments where certain security functionality that is not present in all smart card readers is required Comex Card Reader Status CCR STA Family Behaviour This family defines requirement for the smart card reader to present status indication to the user Component levelling CCR STA Comex Card Reader Status 1 Management CCR STA 1 There are no management activities foreseen Audit CCR STA 1 There are no audit events foreseen CCR_STA 1 Presenting status information to the user Hierarchical to No other components Dependencies No dependencies CCR_STA 1 1 The TOE must present on the display pre defined status information assignment List of pre defined status information to the user as well as requests for user interaction with the TOE Application Note The TOE must be able to ask the user for entering PIN on the keypad and the user placing a finger on the fingerprint sensor The TOE must be able to inform the user of smart card insertion removal information if the TOE malfunctions and the results from emergency erase PIN and fingerprint commands on the display Version 1 21 Comex Electronics AB Page 32 54 6 Security Requirements 6 1 The NFLOW SFP The TOE enforces the information flow control policy NFLOW meaning that PIN PUK and fingerprint data entered by the user on the keypad or the fingerprint sensor via the fingerprin
69. tives The security objectives describe planned responses to existing security problems and threats as described in chapter 3 The CC identifies two categories of security objectives The security objectives for the TOE and the security objectives for the TOE environment Security Objectives for the TOE The security objectives describe planned responses to existing security problems and threats as described in chapter 3 The CC identifies two categories of security objectives The security objectives for the TOE and the security objectives for the operational environment O Residual The TOE must ensure that all user data such as PINs and data entered into the TOE and transferred to and from the TOE and the smart card from previous use are protected against unauthorised access and reuse O Leakage The TOE must ensure that PIN PUK or fingerprint data is not leaked on any external interface but is only transmitted to the smart card interface O Tampering The TOE must provide the means for the user to detect logical tampering that may affect the integrity of the TSF O Malfunction The TOE must at start up and during operation verify the integrity of the TSF and TSF data to ensure the correct functionality of the TOE and to inform the user if an error is detected O Substitute The TOE must provide a mechanism to uniquely identify the version of the TOE to the host PC to enable the host PC to detect switching of TOE models O Emergency The pr
70. trols which texts are presented on the display Version 1 21 Comex Electronics AB Page 44 54 7 1 1 4 7 1 2 1 TSF_CBLOCK Command Blocking For security reasons all 1507816 PIN and OT fingerprint related commands sent by the host PC are blocked by the TOE if e itis a Swedish Defence smart card inserted in a KT2USB version of the TOE e itis a BioSec Card inserted in a BioSec Reader version of the TOE If an ISO smart card is used no command is blocked by the TOE See Table 13 Command blocking for a list of the blocked commands By blocking these commands it is ensured that only the TOE keypad and fingerprint sensor is used for entering PIN and reading fingerprints Instead the TOE accepts reader specific commands with CLA byte 0xE3 for these commands see Table 19 This will ensure that the smart card reader always can distinguish e g the PIN commands and switch to red mode before executing the commands Regarding the fingerprint commands there are no need for smart card reader commands since it is only possible to administer the fingerprints stored on the smart card through the menu system of the TOE e A AT To E A EA E E E A 00h Oh h PIN_ID PIN_ID from host PC host PC PollStatus E3h 10h 00h A Se E DATA to host P FFh FFh Buzzer E3h OEh Duratio OOh 00h n ms Table 19 PIN and fingerprint commands supported by the TOE when a corresponding smart card is used BioSec Reader with
71. upts must result that the TOE is resetting itself and erases all user data If the smart card reader firmware stalls the watchdog circuit will detect it and reset the microcontroller FPT_TST 1 TSF testing FPT_TST 1 1 The TSF shall run a suite of self tests during initial start up and periodically during normal operation to demonstrate the correct operation of the TSF FPT_TST 1 2 The TSF shall provide users with the capability to verify the integrity of TSF data Version 1 21 Comex Electronics AB Page 37 54 FPT_TST 1 3 The TSF shall provide users with the capability to verify the integrity of TSF Application Note The TOE runs a series of self test during start up to verify the integrity of the firmware The TOE also calculates a CRC checksum at start up and also during operation of the executable and compares it against a checksum calculated at the time of compilation The TOE indicates test failures by showing the result on the display A test failure will result in a shutdown of the TOE 6 4 3 4 CCR_IDE 1 Presenting the version identification number to the host PC CCR_IDE 1 1 The TOE must present the version identification ID number to the host PC to which it is connected The ID must be unique to the security specifics of the smart card reader to ensure that a smart card reader with less security functionality is not being used Application Note The vendor must specify how this is being presented and that these I
72. ute since the host PC will have to check the CCID information provided by the TOE O Substitute T Malfunction Malfunctions of the TOE caused by the hardware or software errors are detectable by the TOE s self testing O Malfunction Table 10 Sufficiency of objectives countering threats The following rationale provides justification that the security objectives for the environment are suitable to cover each individual assumption that each security objective for the environment that traces back to an assumption about the environment of use of the TOE when achieved actually contributes to the environment achieving consistency with the assumption and that if all security objectives for the environment that trace back to an assumption are achieved the intended usage is supported Version 1 21 Comex Electronics AB Page 28 54 Assumptions Rationale for the security objectives A User The objective OE User ensures that users of the TOE are appropriately trained for using the TOE A Substitute The objective OE Substitute ensures that the host PC can check whether the smart card reader is exchanged for another model and can take appropriate actions to alert the user A Emergency The objective OE Emergency ensures that the Swedish Defence smart card capable of holding symmetrical keys must also be capable to interpret the commands issued from the smart card reader to erase all symmetri
73. vanic connection for all other versions Version 1 21 Comex Electronics AB Page 19 54 2 Power switch 7 Smart card interface 3 Display 8 Connection for battery eliminator only KT2USB U1 and BioSec A 4 Status LED green for power and 9 Beeper not visible in the pictures smart card communication oscillating 5 Keyboard 10 Sealing label not visible in the pictures and it is not part of the evaluated TSF Figure 4 Description of the smart card reader interfaces Note The BioSec smart card readers do not have the text Kortterminal 2 or the three crown printing above the display but the text BioSec Reader instead The internal hardware and software modules of the TOE are Fingerprint processor with attached sensor Finger Print Cards AB nFPC2000 0043 NSNA NAA Containing software for handling of fingerprint data version 3 0 Finger Print Sensor FPC1011F1 rev 2C Display ANSHAN YES OPTOELECTRONICS DISPLAY MODEL NO YMC12832 34ADBFUGL FSTN mode Transflective Positive type display 128 32 dots USB 2 0 interface circuitry optical transceiver Avago SFP AFBR 57L5APZ module with LC connector USB translation by Xilink FPGA Spartan 3 XC3S200 4TQ144C containing firmware 91 00043 M10_REX mcs Smart card interface Interface chip ADG3304BRUZ Low Voltage 1 15 V to 5 5 V 4 Channel Bidirectional Logic Level Translator Card slot Cannon CCMO2 MK I including switch for card detection Keyboard Ke
74. y when the reader is in standby the smart card reader enters standalone mode and the menu system is activated o Standalone state Menu In standalone state the smart card reader executes commands issued by the user through the menu system Some of these commands involve communicating with the smart card While the menu system is active the smart card reader cannot execute commands sent from the host PC This is handled in the following way e When the user enters the menu system a smart card removed message is sent to the host PC e While the user is in the menu system no host PC commands are executed In case the user forgets to exit the menu system there is a timeout of 30 seconds from the last keypress after which the smart card reader will automatically exit the menu system e When the user leaves the menu system the smart card is reset to invalidate any PINs that might have been verified while in the menu A smart card inserted message is then sent to the host PC if a smart card is inserted and the smart card reader enters connected state A special use case besides connected and stand alone state is the emergency erase functionality named the Key Overwrite Procedure KOP o KOP Key Overwrite Procedure Only available in KT2USB If the F1 key is pressed in either connected or standalone state the smart card reader initiates KOP This is a procedure which after asking for user confirmation overwrites symmetric
75. yboard containing 16 keys Microcontroller with flash memory Atmel MCU 32 BIT AT32 AVR32 RISC 512KB FLASH 1 8V 3 3V XC3S200 4TQ144C TQFP144 The Microcontroller contains the smart card reader software See section 1 2 for the version number of the software Unique circuit board identification number Maxim DS28CMOOR AOO T Watchdog timer Integrated in MCU 15 sec Guidance documentation is included within the scope of the TOE and consists of user manuals Anv ndarmanualer Version of the TOE Name of user manual KT2USB U1 and KT2USB U2 I TST KT2USB U1 U2 KT2USB STD I TST KT2USB STD BioSec A B C User Manual BioSec Reader Table 7 TOE User manuals Version 1 21 Comex Electronics AB Page 20 54 1 4 8 Users and Roles The smart card reader is not aware of any user roles users or administrators However a user of a smart card is associated with the knowledge of the PIN and for some smart cards with the PINs For using specific host PC applications the user may also have to be known to the system and being a user of that system However the smart card reader is unaware of these things Version 1 21 Comex Electronics AB Page 21 54 CC Conformance Claim The ST is CC Part 2 extended and CC Part 3 conformant with a claimed Evaluation Assurance Level of EAL4 augmented by ALC FLR 1 This ST does not claim conformance with any Protection Profile Version 1 21 Comex Electronics AB Page 22 54
Download Pdf Manuals
Related Search
Related Contents
LCXW32HD1 LCXW37HD1 MAXURETHANE Samsung NX3000 Manual de utilizare Manuel Vespa Acma 1955 AutoTrac SSU Jumper Harness Update 1 - flexa APart PR4000R audio tuner ÄKTA™ avant - GE Healthcare Life Sciences Copyright © All rights reserved.
Failed to retrieve file