BS EN 419251-3-2013 Security requirements for device for authentication Additional functionality for security targets《身份验证装置的安全要求 为实现安全目标的补充功能》.pdf
《BS EN 419251-3-2013 Security requirements for device for authentication Additional functionality for security targets《身份验证装置的安全要求 为实现安全目标的补充功能》.pdf》由会员分享,可在线阅读,更多相关《BS EN 419251-3-2013 Security requirements for device for authentication Additional functionality for security targets《身份验证装置的安全要求 为实现安全目标的补充功能》.pdf(84页珍藏版)》请在麦多课文档分享上搜索。
1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS EN 419251-3:2013Security requirements for device for authenticationPart 3: Additional functionality for security targetsBS EN 419251-3:2013 BRITISH STANDARDNational forewordTh
2、is British Standard is the UK implementation of EN 419251-3:2013. The UK participation in its preparation was entrusted to T e c h n i c a l Committee IST/17, Cards and personal identification.A list of organizations represented on this committee can be obtained on request to its secretary.This publ
3、ication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2013. Published by BSI Standards Limited 2013.ISBN 978 0 580 74078 7 ICS 35.240.15 Compliance with a British Standard cannot confer imm
4、unityfrom legal obligations.This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 April 2013.Amendments issued since publicationDate T e x t a f f e c t e dBS EN 419251-3:2013EUROPEAN STANDARD NORME EUROPENNE EUROPISCHE NORM EN 419251-3 March 20
5、13 ICS 35.240.15 English Version Security requirements for device for authentication - Part 3: Additional functionality for security targets Profils de protection pour dispositif dauthentification - Partie 3: Fonctionnalits additionnelles Sicherheitsanforderungen fr Gerte zur Authentisierung - Teil
6、3: Zustzliche Funktionalitten fr Sicherheitsziele This European Standard was approved by CEN on 7 December 2012. CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any al
7、teration. Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member. This European Standard exists in three official versions (English, French, German). A version in any other language m
8、ade by translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Est
9、onia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STA
10、NDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG Management Centre: Avenue Marnix 17, B-1000 Brussels 2013 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. EN 419251-3:2013: EBS EN 419251-3:2013EN 419251-3:201
11、3 (E) 2 Contents Page Foreword . 5 1 Scope 6 2 Normative references . 6 3 Conformance 6 3.1 CC Conformance Claim . 6 3.2 PP Claim . 6 3.3 Package Claim 6 3.4 Conformance Rationale . 6 3.5 Conformance Statement 7 4 Terms and definitions 7 5 Symbols and abbreviations . 9 6 Overview of the target of ev
12、aluation . 9 6.1 TOE Type 9 6.2 TOE Usage 9 6.3 Security Features of the TOE . 10 6.4 Required non-TOE Hardware and Software 10 6.5 Protection Profile Usage 10 6.6 Groups 10 6.6.1 General . 10 6.6.2 Main groups 10 6.6.3 Environment groups 11 6.7 Configurations 13 6.7.1 General . 13 6.7.2 Rules . 13
13、6.7.3 Possible Configurations 14 6.8 TOE Environment . 15 6.8.1 Overall view 15 6.8.2 Personalisation application . 16 6.8.3 Administration application 17 6.8.4 Authentication application . 18 6.8.5 Verifier 19 6.8.6 Key Generator 19 6.8.7 Certification Authority 20 6.8.8 Examples of applications. 2
14、0 6.9 Life Cycle 22 6.9.1 Overview . 22 6.9.2 Pre-Personalisation phase . 23 6.9.3 Personalisation phase . 23 6.9.4 Usage phase . 24 7 Security problem definition . 26 7.1 Assets . 26 7.1.1 General . 26 7.1.2 Core group 26 7.1.3 KeyGen group 26 7.1.4 Admin group . 27 7.2 Users . 27 7.2.1 Core group
15、27 7.2.2 KeyImp group . 28 BS EN 419251-3:2013EN 419251-3:2013 (E) 3 7.2.3 KeyGen group 28 7.2.4 Admin group . 28 7.3 Threats 28 7.3.1 General . 28 7.3.2 Core group 29 7.3.3 KeyGen group 30 7.3.4 Admin group . 30 7.4 Organisational security policies 30 7.4.1 Core group 30 7.4.2 KeyGen group 31 7.4.3
16、 Admin group . 31 7.5 Assumptions 31 7.5.1 Core group 31 7.5.2 KeyGen group 32 7.5.3 Admin group . 32 8 Security objectives . 32 8.1 General Transfer of sensitive data . 32 8.2 Security objectives for the TOE . 33 8.2.1 Core group 33 8.2.2 KeyImp group . 34 8.2.3 KeyGen group 34 8.2.4 Admin group .
17、34 8.2.5 Untrusted PersoAppli . 35 8.2.6 Untrusted AuthAppli 35 8.2.7 Untrusted Verifier . 35 8.2.8 Untrusted CA 35 8.2.9 Untrusted AdminAppli 35 8.3 Security objectives for the operational environment 36 8.3.1 Core group 36 8.3.2 KeyImp group . 36 8.3.3 Admin group . 37 8.3.4 Trusted PersoAppli 37
18、8.3.5 Trusted AuthAppli 37 8.3.6 Trusted Verifier . 37 8.3.7 Trusted CA 37 8.3.8 Trusted AdminAppli . 37 8.4 Rationale for Security objectives . 38 9 Extended component definition Definition of the Family FCS_RNG . 43 10 Security requirements 43 10.1 General . 43 10.2 Introduction 44 10.2.1 Subjects
19、 Objects and security attributes 44 10.2.2 Operations 45 10.3 Security functional requirements 46 10.3.1 General . 46 10.3.2 Core group 47 10.3.3 KeyImp group . 55 10.3.4 KeyGen group 58 10.3.5 Admin group . 61 10.3.6 Untrusted PersoAppli . 65 10.3.7 Untrusted AuthAppli 66 10.3.8 Untrusted Verifier
20、. 66 10.3.9 Untrusted CA 67 10.3.10 Untrusted AdminAppli 68 10.4 Security assurance requirements 68 10.5 SFR / Security objectives . 69 10.6 SFR Dependencies . 74 10.7 Rationale for the Assurance Requirements 76 BS EN 419251-3:2013EN 419251-3:2013 (E) 4 Bibliography 78 Index 79 Figures Figure 1 TOE
21、Security Features . 15 Figure 2 Personalisation application environment . 16 Figure 3 Administration application environment . 17 Figure 4 Authentication application environment . 18 Figure 5 TOE Life Cycle . 22 Tables Table 1 Basic configurations . 14 Table 2 IdTrusted configurations 14 Table 3 Pro
22、tection of sensitive data 33 Table 4 Security objectives vs problem definition rationale 38 Table 5 Security attributes 45 Table 6 Core security attributes 50 Table 7 Core operations . 50 Table 8 Core security attributes Operation . 51 Table 9 Core security attributes - initial value 52 Table 10 Cor
23、e security attributes Updates . 53 Table 11 TSF data updates . 53 Table 12 KeyImp security attributes 55 Table 13 KeyImp security attributes - operations . 56 Table 14 KeyImp security attributes update authorised roles 57 Table 15 KeyImp security attributes update values 58 Table 16 KeyGen operation
24、s 59 Table 17 KeyGen security attributes . 59 Table 18 KeyGen operation rules . 60 Table 19 KeyGen security attributes update authorised roles . 60 Table 20 KeyGen security attributes initial values 61 Table 21 KeyGen security attributes update values 61 Table 22 Admin security attributes update aut
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSEN41925132013SECURITYREQUIREMENTSFORDEVICEFORAUTHENTICATIONADDITIONALFUNCTIONALITYFORSECURITYTARGETS

链接地址:http://www.mydoc123.com/p-574429.html