EN 419251-2-2013 en Security requirements for device for authentication - Part 2 Protection profile for extension for trusted channel to certificate generation application《身份验证用装置的.pdf
《EN 419251-2-2013 en Security requirements for device for authentication - Part 2 Protection profile for extension for trusted channel to certificate generation application《身份验证用装置的.pdf》由会员分享,可在线阅读,更多相关《EN 419251-2-2013 en Security requirements for device for authentication - Part 2 Protection profile for extension for trusted channel to certificate generation application《身份验证用装置的.pdf(76页珍藏版)》请在麦多课文档分享上搜索。
1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS EN 419251-2:2013Security requirements for device for authenticationPart 2: Protection profile for extension for trusted channel to certificate generation applicationBS EN 4192
2、51-2:2013 BRITISH STANDARDNational forewordThis British Standard is the UK implementation of EN 419251-2:2013. The UK participation in its preparation was entrusted to T e c h n i c a l Committee IST/17, Cards and personal identification.A list of organizations represented on this committee can be o
3、btained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2013. Published by BSI Standards Limited 2013.ISBN 978 0 580 74077 0 ICS 35.240.15 Complia
4、nce with a British Standard cannot confer immunityfrom legal obligations.This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 April 2013.Amendments issued since publicationDate T e x t a f f e c t e dBS EN 419251-2:2013EUROPEAN STANDARD NORME E
5、UROPENNE EUROPISCHE NORM EN 419251-2 March 2013 ICS 35.240.15 English Version Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application Profils de protection pour dispositif dauthentification - Partie 2: D
6、ispositf avec import de cl, gnration de cl et administration; Communication scurise vers lapplication de gnration de certificats et lapplication dadministrationSicherheitsanforderungen fr Gerte zur Authentisierung - Teil 2: Schutzprofil fr Erweiterung fr vertrauenswrdigen Kanal zur Zertifikaterzeugu
7、ngsanwendung This European Standard was approved by CEN on 7 December 2012. CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration. Up-to-date lists and biblio
8、graphical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member. This European Standard exists in three official versions (English, French, German). A version in any other language made by translation under the responsi
9、bility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republ
10、ic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALI
11、SATION EUROPISCHES KOMITEE FR NORMUNG Management Centre: Avenue Marnix 17, B-1000 Brussels 2013 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. EN 419251-2:2013: EBS EN 419251-2:2013EN 419251-2:2013 (E) 2 Contents Page Foreword . 5 1
12、Scope 6 2 Normative references . 6 3 Conformance 6 3.1 CC Conformance Claim . 6 3.2 PP Claim . 6 3.3 Package Claim 6 3.4 Conformance Rationale . 6 3.5 Conformance Statement 6 4 Terms and definitions 7 5 Symbols and abbreviations . 9 6 Overview of the target of evaluation . 9 6.1 TOE Type 9 6.2 TOE U
13、sage 9 6.3 Security Features of the TOE . 9 6.4 Examples of applications. 11 6.4.1 E-government . 11 6.4.2 Multiple applications 11 6.5 Required non-TOE Hardware and Software 12 6.6 Protection Profile Usage 12 7 TOE Environment . 13 7.1 Overall view 13 7.2 Personalisation application . 14 7.2.1 Gene
14、ral . 14 7.2.2 Functionalities 14 7.2.3 Communication 14 7.3 Administration application 15 7.3.1 General . 15 7.3.2 Functionalities 15 7.3.3 Communication 15 7.4 Authentication application . 16 7.4.1 General . 16 7.4.2 Functionalities 16 7.4.3 Communication 16 7.5 Verifier 17 7.5.1 Functionalities 1
15、7 7.5.2 Communication 17 7.6 Key Generator 17 7.6.1 Functionalities 17 7.6.2 Communication 17 7.7 Certification Authority 18 7.7.1 Functionalities 18 7.7.2 Communication 18 8 Life Cycle 19 8.1 Overview . 19 8.2 Pre-Personalisation phase . 20 8.3 Personalisation phase . 20 8.3.1 General . 20 BS EN 41
16、9251-2:2013EN 419251-2:2013 (E) 3 8.3.2 Personalisation application . 21 8.4 Usage phase . 21 8.4.1 Authentication application . 21 8.4.2 Administration application . 22 8.4.3 Verifier 23 9 Security problem definition . 23 9.1 Assets . 23 9.1.1 General . 23 9.1.2 Assets protected by the TOE . 23 9.1
17、.3 Sensitive assets of the TOE . 23 9.2 Users . 24 9.3 Threats 25 9.4 Organisational security policies 27 9.4.1 Provided services . 27 9.4.2 Other services 27 9.5 Assumptions 28 10 Security objectives . 29 10.1 General . 29 10.2 Security objectives for the TOE . 29 10.2.1 Provided service . 29 10.2.
18、2 Authentication to the TOE 29 10.2.3 TOE management . 30 10.3 Security objectives for the operational environment 31 10.4 Rationale for Security objectives . 33 11 Extended component definition Definition of the Family FCS_RNG . 38 12 Security requirements 39 12.1 General . 39 12.2 Introduction 40
19、12.2.1 Subjects Objects and security attributes 40 12.2.2 Operations 40 12.3 Security functional requirements 41 12.3.1 General . 41 12.3.2 Core 41 12.3.3 KeyImp 49 12.3.4 KeyGen . 52 12.3.5 Admin 55 12.3.6 Untrusted CA 59 12.3.7 Untrusted AdminAppli 60 12.4 Security assurance requirements 61 12.5 S
20、FR / Security objectives . 61 12.6 SFR Dependencies . 67 12.7 Rationale for the Assurance Requirements 69 Bibliography 70 Index 71 Figures Figure 1 TOE Security Features 13 Figure 2 Personalisation application environment 14 Figure 3 Administration application environment 15 Figure 4 Authentication
21、application environment 16 Figure 5 TOE Life Cycle 19 BS EN 419251-2:2013EN 419251-2:2013 (E) 4 Tables Table 1 protection of sensitive data 29 Table 2 Security objectives vs problem definition rationale 34 Table 3 Security attributes 40 Table 4 Core security attributes 44 Table 5 Core operations . 4
22、4 Table 6 Core security attributes - operation. 46 Table 7 Core security attributes - initial value 46 Table 8 Core security attributes updates 47 Table 9 TSF data updates . 47 Table 10 KeyImp security attributes 49 Table 11 KeyImp security attributes - operations . 50 Table 12 KeyImp security attri
23、butes update authorised roles 51 Table 13 KeyImp security attributes update values 52 Table 14 KeyGen operations 53 Table 15 KeyGen security attributes . 53 Table 16 KeyGen operation rules . 54 Table 17 KeyGen security attributes update authorised roles . 54 Table 18 KeyGen security attributes initi
24、al values 55 Table 19 KeyGen security attributes update values 55 Table 20 Admin security attributes update authorised roles 58 Table 21 Admin security attributes initial values . 58 Table 22 Admin security attributes update values 58 Table 23 Admin TSF data operations . 59 Table 24 SFR vs Security
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- EN41925122013ENSECURITYREQUIREMENTSFORDEVICEFORAUTHENTICATIONPART2PROTECTIONPROFILEFOREXTENSIONFORTRUSTEDCHANNELTOCERTIFICATEGENERATIONAPPLICATION

链接地址:http://www.mydoc123.com/p-716530.html