Cen Workshop Agreement Cwa 14722-3
Total Page:16
File Type:pdf, Size:1020Kb
CEN CWA 14722-3 WORKSHOP August 2004 AGREEMENT ICS 35.240.15 Supersedes CWA 14722-3:2004 English version Embedded financial transactional IC card reader (embedded FINREAD) - Part 3: Functional and Security Specifications This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the constitution of which is indicated in the foreword of this Workshop Agreement. The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the National Members of CEN but neither the National Members of CEN nor the CEN Management Centre can be held accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation. This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members. This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies. CEN members are the national standards bodies of Austria, Belgium, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG Management Centre: rue de Stassart, 36 B-1050 Brussels © 2004 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No.:CWA 14722-3:2004 E CWA 14722-3:2004 (E) Contents Page Foreword..............................................................................................................................................................4 1 Scope ......................................................................................................................................................4 2 Normative references ............................................................................................................................6 3 Terms, definitions and abbreviations..................................................................................................7 3.1 Terms and definitions ...........................................................................................................................7 3.2 Abbreviation ...........................................................................................................................................8 4 Part I – Functional specifications.......................................................................................................11 4.1 The basics of Embedded FINREAD ...................................................................................................11 4.2 Embedded FINREAD operating modes .............................................................................................23 4.3 Peripherals ...........................................................................................................................................26 4.4 Embedded FINREAD Card Reader Applications ..............................................................................28 4.5 Embedded FINREAD card reader authentication .............................................................................30 4.6 Embedded FINREAD card reader application functions .................................................................31 4.7 Embedded FINREAD Aware Application functions..........................................................................33 4.8 Application provisioning and key management functions..............................................................34 4.9 Vendor specific functions...................................................................................................................34 5 Part II – Security specifications..........................................................................................................34 5.1 Assumptions ........................................................................................................................................34 5.2 Security Requirements........................................................................................................................36 5.3 Specification of implementation ........................................................................................................40 5.4 Key management .................................................................................................................................43 5.5 Cryptographic functions and random number generator ...............................................................46 Annex A Security objectives, Security requirements and rationale............................................................48 A.1 Introduction ..........................................................................................................................................48 A.2 EFCR GENERIC MODEL DESCRIPTION............................................................................................51 A.3 EFCR SECURITY ENVIRONMENT ......................................................................................................56 A.4 SECURITY OBJECTIVES.....................................................................................................................62 A.5 IT SECURITY FUNCTIONAL REQUIREMENTS..................................................................................64 A.6 RATIONALE ..........................................................................................................................................67 A.7 Glossary................................................................................................................................................85 A.8 Common Criteria glossary..................................................................................................................86 2 CWA 14722-3:2004 (E) Figures Page Figure 1 – Example of an Embedded FINREAD Device .................................................................................11 Figure 2 – Generic Integrated EFD architecture.............................................................................................12 Figure 3 – Simplified example of an Embedded FINREAD system architecture used in a payment context ................................................................................................................................................................13 Figure 4 – Activation of an EFCRA by a push command ..............................................................................15 Figure 5 – Activation of an EFCRA by a resident DVB-MPH Xlet embedded in a DVB-HTLM page..........17 Figure 6 – Activation of a standalone EFCRA by the user ............................................................................18 Figure 7 – Communication with remote entities initiated by the EFCRA ....................................................19 Figure 8 – EFCR architecture overview...........................................................................................................21 Figure 9 – Logical host hardware and software components.......................................................................23 Figure 10 – Operating mode state diagram.....................................................................................................24 Figure 11 – Suspension of an EFCRA in Embedded FINREAD secure mode .............................................26 Figure 12 – EFCR firmware interface to resources ........................................................................................32 Figure 13 – Firmware interface between EFAAs and the EFCR....................................................................34 Figure 14 – Example of a hierarchical certification tree ................................................................................44 Figure 15 – Example of a set of public keys for an Embedded FINREAD device .......................................46 Figure A.1 – Relations between Threats, Security Objectives, OSP and Security Requirements ............53 Figure A.2 – Scope of Embedded FINREAD ...................................................................................................53 Figure A.3 – Generic EFD architecture............................................................................................................54 Figure A.4 – EFD Hardware and Software architecture .................................................................................55 Figure A.5 – EFCR Life Cycle scheme.............................................................................................................56 Figure A.6 – Internal Confidence Tree overview ............................................................................................58 3 CWA 14722-3:2004 (E) Foreword The production of this CWA (CEN Workshop Agreement) specifying a Embedded Financial transactional IC card reader (Embedded FINREAD), was formally accepted at the Embedded FINREAD Workshop's kick-off meeting on 2001-12-14. The document has been developed through the collaboration of a number of contributing partners in WS-Embedded FINREAD, representing smart card interests. This CWA has received the support of representatives of each of these sectors. A list of company experts who have supported the document's contents may be obtained from the CEN/ISSS Secretariat.