Smartcard Evaluation TM8104 – IT Security Evaluation 2008-11-13Linda Ariani Gunawan.

Slides:



Advertisements
Similar presentations
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Advertisements

best practice project management methodology ©Platinum Services Group Limited What is XPRODi ?
Calyxinfo Walking through Calyx Info The Organisation.
Ecosystem Scenarios for Cloud-based NFC Payments
Terminal Quality Management Overview 2010
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
ITIL: Service Transition
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Dr. Julian Lo Consulting Director ITIL v3 Expert
1 Software Requirement Analysis Deployment Package for the Basic Profile Version 0.1, January 11th 2008.
Cadle & Yeates Ch 5 Revised by Ivor Perry Sept Detailed Planning - 1.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
1 Samples The following slides are provided as samples and references for the Quarterly Reviews Additional slides will be added.
Project Management Methodology (PMM)
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
ISO 9000 Certification ISO 9001 and ISO
Laboratory Information Management Systems (LIMS) Lindy A. Brigham Div of Plant Pathology and Microbiology Department of Plant Sciences PLS 595D Regulatory.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
NVLAP Overview and Accreditation Process March 2006.
1 Configuration Management 101 ITS Professional Capacity Building Program T3 Webinar February 21, 2008.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
EOSC Generic Application Security Framework
Managing Software Quality
Mantychore Oct 2010 WP 7 Andrew Mackarel. Agenda 1. Scope of the WP 2. Mm distribution 3. The WP plan 4. Objectives 5. Deliverables 6. Deadlines 7. Partners.
Effective banking products CC evaluations. 8 th I.C.C.C. Rome, September 26th, CHIOCCA Martine Banking products Security Risk Manager.
1 Configuration Management “The Cookbook Approach”
FCS - AAO - DM COMPE/SE/ISE 492 Senior Project 2 System/Software Test Documentation (STD) System/Software Test Documentation (STD)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Omissions and errors in the CC Who got it right? 8ICCC Denise Cater.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Background. History TCSEC Issues non-standard inflexible not scalable.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Unit 8b Troubleshooting; Maintenance and Upgrades; Interaction with Vendors, Developers, and Users Component 8 Installation and Maintenance of Health IT.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
MODA-TEL An IST project on Model Driven Architectures for Telecommunications System Development and Operation.
© Mahindra Satyam 2009 Configuration Management QMS Training.
The National Smartcard Project and the Citizen Experience Oliver Ferguson Workpackage Project Manager.
April 20023CSG11 Electronic Commerce Smartcards John Wordsworth Department of Computer Science The University of Reading Room.
Module 4: Systems Development Chapter 14: Design And Implementation.
Workforce Scheduling Release 5.0 for Windows Implementation Overview OWS Development Team.
Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
The National Smartcard Project Vaughan Cooksey WP 10 & 11 Project Manager IDeA e-Champions 22nd January.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix B: Getting Started in Systems Analysis and Design.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
JAVA CARD Presented by: MAYA RAJ U C A S,PATHANAMTHITTA.
UnionPay Card Manufacturer Certification Introduction.
Dec. 6, 2010 Gum-Ho Choe Accreditation of Software Testing Working Group, APLAC Technical Committee.
9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Statistical process model Workshop in Ukraine October 2015 Karin Blix Quality coordinator
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
Testing throughout Lifecycle Ljudmilla Karu. Verification and validation (V&V) Verification is defined as the process of evaluating a system or component.
Installation and Commisioning SE view point Romuald Duperrier ESS SE manager.
Sap Apo Online Training And Certification Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA.
Electronic Commerce Smartcards
Learn Your Information Security Management System
Smart Card Technology Why is a Smart Card So Smart?
د. حنان الداقيز خريف /28/2016 Software Quality Assurance ضمان جودة البرمجيات ITSE421 5 – The components of the SQA.
Smart Card.
Engineering Processes
9th International Common Criteria Conference Report to IEEE P2600 WG
Smart Cards Todd Moran.
Presentation transcript:

Smartcard Evaluation TM8104 – IT Security Evaluation Linda Ariani Gunawan

Document CCDB Version 1.3 Revision 1, March 2006 Type: guidance document Intended for evaluation sponsor and smartcard developers Field of special use: smartcards and similar devices

SMARTCARD OVERVIEW

Smartcard Plastic card embedded with a computer chip that stores and transacts data between users Usage: – Telecommunication: SIM card, pay phone – Banking: debit/credit cards – Transportation: pay toll, bus/tram/train card – E-passport, ID card, health card, access card and many more

Smartcard Types Contact cards Contactless cards Dual interface cards

Smartcards Related Standards ISO 7816 “Identification cards – Integrated circuit cards with contacts” EMV – Europay, MasterCard, Visa ETSI – GSM FIPS 140 (1-3) and 201 OCF – Open Card Framework PC/SC – Interoperability Specification for ICCs and Personal Computer Systems

THE GUIDANCE DOCUMENT

Definition – IC Integrated Circuit (IC)

Definition – Software IC Dedicated Software IC Firmware proprietary, embedded developed by IC Developer 2 parts: – IC Dedicated Test Software Only used to test IC – IC Dedicated Support Software Provide functions after IC manufacturing & testing process Smartcard Embedded Software (ES) embedded NOT developed by IC Designer But by embedded software developer 2 types: – Basic Software (BS) in charge of generic functions of smart card IC OS, general routines, interpreters – Application Software (AS) dedicated to applications

Definitions – Data Identification data defined by IC manufacturer injected into non-volatile memory during manufacturing process usage: traceability IC Pre-personalization data supplied by software developer injected into non-volatile memory during manufacturing process customer data

Definitions – Personalization IC Pre-personalization process at IC manufacturer site load customer data onto IC then IC is irreversibly set into “issuer mode” Smartcard Personalization process at card issuer smartcard is configured, security parameters loaded, secret key set then smartcard is irreversibly set into “user mode”

Definitions – Product IC platform smartcard component not an end-user product may undergo evaluation e.g. without AS Smartcard product fully operational smartcard both IC+ES including AS

Smartcard Architectures Closed architectureOpen architecture

Smartcard Product Life-Cycle Ph 1. Smartcard embedded software development Smartcard Embedded Software Developer Smartcard embedded software Specification of IC pre- personalization requirements Ph 2. IC development IC Designer IC design IC dedicated software support Smartcard IC database for IC photomask fabrication

Smartcard Product Life-Cycle Ph 3. IC manufacturing and testing Ph 4. IC packaging and testing IC Manufacturer IC product IC manufacturing IC testing IC pre-personalization IC Packaging Manufacturer Ph 5. Smartcard product finishing process Smartcard Product Manufacturer IC packaging and testing Smartcard product finishing and testing

Smartcard Product Life-Cycle Ph 6. Smartcard personalization Ph 7. Smartcard end-usage Smartcard product delivery Personalizer Smartcard personalization and final test Smartcard Issuer Smartcard End-User

Roles in Evaluation Process IC Manufacturer ES/AS Developer Card Manufacturer Card Issuer Sponsor Evaluator Certification Body Requesting evaluation and financing it Maybe developer of TOE, card issuer or independent Laboratory performs the evaluation Issue certificate Developer

Evaluation Preparation Steps

Roles Contributions IC Manufacturer – Evaluation scope: include IC – Provides ST for IC to sponsor – Provides evaluation deliverable to evaluation lab ES/AS Developer – Evaluation scope: include ES/AS – (Assist) write ST – Provides evaluation deliverable to evaluation lab – Provides IC pre-personalization data

Roles Contributions Card Issuer – Approve ST – Define Smartcard personalization data – Write smartcard product guidance documentation Sponsor – Write and/or approve ST – Ensure every required evaluation deliverable available for evaluator

Roles Contributions Evaluator – Analyses evidences – Evaluation process: Conformance and penetration testing on TOE Site visit to development premises Site visit to production premises (evaluation incl. IC) Write evaluation reports

Roles Contributions Certification body – Approve evaluation scope in ST before evaluation process starts – Give advice – Monitor evaluation work – Issue certificate and certification report

Common Targeted EAL EAL1+ – EAL1 augmented with AVA_VLA.2 EAL4+ – EAL4 augmented with ADV_IMP.2, ALC_DVS.2 and AVA_VLA.4 Detailed roles contribution are specified in detail for both EALs According CC v2

Theoretical Planning for EAL4+ Evaluation Assumption: – Evaluation phase only – IC is certified – Infinite # of evaluators with good knowledge – No delay – No iteration, developers are well trained 6 months is achievable

Theoretical Planning for EAL4+ Evaluation

Smartcard Sub-processes for EAL4+ software development for smartcard only, not application development 4 sub processes: – Development environment – Security Target – Guidance documentation – Development/Test Reusability through training and document template

Testing Methodology Used by security evaluation laboratory Define attack and strategies list