BS EN 419211-5:2013
$142.49
Protection profiles for secure signature creation device – Extension for device with key generation and trusted channel to signature creation application
Published By | Publication Date | Number of Pages |
BSI | 2013 | 28 |
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and communicate with the signature creation application in protected manner: secure signature creation device with key generation and trusted communication with signature creation application (SSCD KG TCSCA).
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Contents Page |
5 | Foreword |
6 | Introduction |
7 | 1 Scope 2 Normative references 3 Conventions and terminology 3.1 Conventions 3.2 Terms and definitions 4 PP introduction 4.1 PP reference |
8 | 4.2 PP overview 4.3 TOE overview 4.3.1 Operation of the TOE |
9 | 4.3.2 Target of evaluation |
10 | 4.3.3 TOE lifecycle 5 Conformance claims 5.1 CC conformance claim 5.2 PP claim, Package claim 5.3 Conformance rationale |
11 | 5.4 Conformance statement 6 Security problem definition 6.1 Assets, users and threat agents |
12 | 6.2 Threats 6.3 Organizational security policies 6.4 Assumptions 7 Security objectives 7.1 Security objectives for the TOE 7.1.1 Relation to core PP SSCD KG 7.1.2 OT.TOE_TC_VAD_Imp Trusted channel of TOE for VAD import |
13 | 7.1.3 OT.TOE_TC_DTBS_Imp Trusted channel of TOE for DTBS import 7.2 Security objectives for the operational environment 7.2.1 Relation to core PP 7.2.2 OE.HID_TC_VAD_Exp Trusted channel of HID for VAD export 7.2.3 OE.SCA_TC_DTBS_Exp Trusted channel of SCA for DTBS export |
14 | 7.3 Security objectives rationale 7.3.1 Security objectives backtracking Table 1 – Mapping of security problem definition to security objectives |
15 | 7.3.2 Security objectives sufficiency |
16 | 8 Extended components definition 9 Security requirements 9.1 Security functional requirements 9.1.1 Use of requirement specifications |
17 | 9.1.2 FIA_UAU.1 Timing of authentication |
18 | 9.1.3 FDP_UIT.1/DTBS Data exchange integrity 9.1.4 FTP_ITC.1/VAD Inter-TSF trusted channel ā TC Human Interface Device |
19 | 9.1.5 FTP_ITC.1/DTBS Inter-TSF trusted channel ā Signature creation Application |
20 | 9.2 Security assurance requirements Table 2 – Assurance requirements: EAL4 augmented with AVA_VAN.5 |
21 | 9.3 Security requirements rationale 9.3.1 Security requirements coverage Table 3 – Mapping of functional requirements to security objectives for the TOE |
22 | 9.3.2 TOE security requirements sufficiency |
23 | 9.3.3 Satisfaction of dependencies of chosen security requirements Table 4 – Satisfaction of dependencies of security functional requirements |
25 | Table 5 – Satisfaction of dependencies of security assurance requirements 9.3.4 Rationale for chosen security assurance requirements |
26 | Bibliography |