Idmove V4 on Infineon in PACE Configuration with AA And/Or CA in Option Product
Total Page:16
File Type:pdf, Size:1020Kb
IDmove v4 on Infineon in PACE configuration with AA and/or CA in option Public Security Target Public PUBLIC About IDEMIA OT-Morpho is now IDEMIA, the global leader in trusted identities for an increasingly digital world, with the ambition to empower citizens and consumers alike to interact, pay, connect, travel and vote in ways that are now possible in a connected environment. Securing our identity has become mission critical in the world we live in today. By standing for Augmented Identity, we reinvent the way we think, produce, use and protect this asset, whether for individuals or for objects. We ensure privacy and trust as well as guarantee secure, authenticated and verifiable transactions for international clients from Financial, Telecom, Identity, Security and IoT sectors. With close to €3bn in revenues, IDEMIA is the result of the merger between OT (Oberthur Technologies) and Safran Identity & Security (Morpho). This new company counts 14,000 employees of more than 80 nationalities and serves clients in 180 countries. | For more information, visit www.idemia.com / Follow @IdemiaGroup on Twitter © IDEMIA. All rights reserved. Specifications and information are subject to change without notice. The products described in this document are subject to continuous development and improvement. All trademarks and service marks referred to herein, whether registered or not in specific countries, are the properties of their respective owners. - Printed versions of this document are uncontrolled - 2/115 Security Target Public PUBLIC APPROVAL Name Position Date - Signature CRON-SILVY, Julien Author Approuver FQR 110 9128 Issue 2 par Julien CRON-SILVY le 15-07-2019.msg BOUDINEAU, Jérôme Product Manager Approuver FQR 110 9128 Issue 2 par Jerome BOUDINEAU le 18-07-2019.msg 3/115 Security Target PUBLIC DOCUMENT REVISION Date Revision Modification Modified by 2019/03/21 0.1 Creation CRON-SILVY Julien 2019/03/26 1.0 Approve Issue 1 of the document CRON-SILVY Julien 2019/05/24 1.1 §2.1.2: Update OS Commercial Version to 090804 and CRON-SILVY Julien OS Unique Identifier to 3C1D. §10: Update [IC_ST] reference 2019/06/20 1.2 §10: Update [TR_03111], [IC_ST], [IC_CERT] & CRON-SILVY Julien [IC_PPM] references §10: Add [ISO_9796_2] §7.1.2.3: Update FCS_COP.1.1/SIG_GEN referenced standards 2019/07/18 2 Approve Issue 2 of the document CRON-SILVY Julien 4/115 Security Target PUBLIC TABLE OF CONTENT 1 GENERAL ............................................................................................................13 1.1 Introduction ........................................................................................................ 13 1.2 Product overview ................................................................................................ 13 2 ST INTRODUCTION ..............................................................................................14 2.1 ST reference and TOE reference ............................................................................ 14 2.1.1 ST reference ................................................................................................. 14 2.1.2 TOE reference ............................................................................................... 14 2.1.3 IC identification............................................................................................. 14 2.1.4 TOE Delivered Parts ....................................................................................... 15 2.2 TOE overview ...................................................................................................... 16 2.2.1 Usage and major security features of the TOE .................................................. 16 2.2.2 TOE type ...................................................................................................... 19 2.2.3 TOE life cycle ................................................................................................ 20 2.2.3.1 Life cycle overview ..................................................................................................... 20 2.2.3.2 Life cycle phases ........................................................................................................ 22 2.2.4 Required non-TOE hardware/Software/firmware ............................................. 24 2.3 TOE description ................................................................................................... 25 2.3.1 TOE Architecture ........................................................................................... 25 2.3.2 Integrated Circuit .......................................................................................... 26 2.3.3 Low layer ..................................................................................................... 27 2.3.3.1 IDEMIA Basic Input/Output System (BIOS) ................................................................... 27 2.3.3.2 IDEMIA Cryptographic library (Crypto) ........................................................................ 27 2.3.4 Platform layer ............................................................................................... 27 2.3.4.1 Services .................................................................................................................... 27 2.3.5 Authentication Protocols ............................................................................... 28 2.3.5.1 Terminal Authentication (TA) ...................................................................................... 28 2.3.5.2 Chip Authentication (CA) ............................................................................................ 28 2.3.5.3 Password Authenticated Connection Establishment (PACE v2) ...................................... 28 2.3.5.4 Active Authentication (AA) ......................................................................................... 28 2.3.6 Application layer ........................................................................................... 29 2.3.6.1 Start-Up and Applications Manager (Boot) .................................................................. 29 2.3.6.2 Application Creation Engine (ACRE) ............................................................................. 29 2.3.6.3 Resident Application (RA) ........................................................................................... 29 5/115 Security Target PUBLIC 2.3.6.4 Machine Readable Travel Document (MRTD) ............................................................... 29 3 CONFORMANCE CLAIMS ......................................................................................30 3.1 Common Criteria conformance ............................................................................. 30 3.2 Protection Profile conformance ............................................................................ 31 3.2.1 Overview...................................................................................................... 31 3.2.2 Assumptions ................................................................................................. 31 3.2.3 Threats ........................................................................................................ 32 3.2.4 Organizational Security Policies ...................................................................... 32 3.2.5 Security Objectives ........................................................................................ 33 4 SECURITY PROBLEM DEFINITION ..........................................................................34 4.1 Assets ................................................................................................................. 34 4.1.1 Overview...................................................................................................... 34 4.1.2 User data stored on the TOE........................................................................... 34 4.1.2.1 Personal Data ............................................................................................................ 34 4.1.2.2 EF.COM ..................................................................................................................... 34 4.1.3 User data transferred between the TOE and the terminal connected .................. 35 4.1.4 MRTD tracing data ........................................................................................ 35 4.1.5 Accessibility to the TOE functions and data only for authorised subjects ............. 35 4.1.6 Genuineness of the TOE ................................................................................. 35 4.1.7 TOE intrinsic secret cryptographic keys ............................................................ 35 4.1.7.1 Chip Authentication Private Key (CA_SK) ..................................................................... 35 4.1.7.2 Active Authentication Private Key (AA_SK) ................................................................... 35 4.1.7.3 Secure Messaging session keys (Session_K).................................................................. 35 4.1.7.4 PACE session keys (PACE-Kmac, PACE-Kenc) ................................................................ 35 4.1.7.5 Ephemeral private key PACE (ephem-Skpicc-PACE) ....................................................... 35 4.1.8 TOE intrinsic non secret cryptographic material ................................................ 36 4.1.8.1 EF.SOD ...................................................................................................................... 36 4.1.8.2 Chip Authentication