Shopping Cart

No products in the cart.

BS EN 419211-5:2013

$142.49

Protection profiles for secure signature creation device – Extension for device with key generation and trusted channel to signature creation application

Published By Publication Date Number of Pages
BSI 2013 28
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and communicate with the signature creation application in protected manner: secure signature creation device with key generation and trusted communication with signature creation application (SSCD KG TCSCA).

PDF Catalog

PDF Pages PDF Title
4 Contents Page
5 Foreword
6 Introduction
7 1 Scope
2 Normative references
3 Conventions and terminology
3.1 Conventions
3.2 Terms and definitions
4 PP introduction
4.1 PP reference
8 4.2 PP overview
4.3 TOE overview
4.3.1 Operation of the TOE
9 4.3.2 Target of evaluation
10 4.3.3 TOE lifecycle
5 Conformance claims
5.1 CC conformance claim
5.2 PP claim, Package claim
5.3 Conformance rationale
11 5.4 Conformance statement
6 Security problem definition
6.1 Assets, users and threat agents
12 6.2 Threats
6.3 Organizational security policies
6.4 Assumptions
7 Security objectives
7.1 Security objectives for the TOE
7.1.1 Relation to core PP SSCD KG
7.1.2 OT.TOE_TC_VAD_Imp Trusted channel of TOE for VAD import
13 7.1.3 OT.TOE_TC_DTBS_Imp Trusted channel of TOE for DTBS import
7.2 Security objectives for the operational environment
7.2.1 Relation to core PP
7.2.2 OE.HID_TC_VAD_Exp Trusted channel of HID for VAD export
7.2.3 OE.SCA_TC_DTBS_Exp Trusted channel of SCA for DTBS export
14 7.3 Security objectives rationale
7.3.1 Security objectives backtracking
Table 1 – Mapping of security problem definition to security objectives
15 7.3.2 Security objectives sufficiency
16 8 Extended components definition
9 Security requirements
9.1 Security functional requirements
9.1.1 Use of requirement specifications
17 9.1.2 FIA_UAU.1 Timing of authentication
18 9.1.3 FDP_UIT.1/DTBS Data exchange integrity
9.1.4 FTP_ITC.1/VAD Inter-TSF trusted channel ā€“ TC Human Interface Device
19 9.1.5 FTP_ITC.1/DTBS Inter-TSF trusted channel ā€“ Signature creation Application
20 9.2 Security assurance requirements
Table 2 – Assurance requirements: EAL4 augmented with AVA_VAN.5
21 9.3 Security requirements rationale
9.3.1 Security requirements coverage
Table 3 – Mapping of functional requirements to security objectives for the TOE
22 9.3.2 TOE security requirements sufficiency
23 9.3.3 Satisfaction of dependencies of chosen security requirements
Table 4 – Satisfaction of dependencies of security functional requirements
25 Table 5 – Satisfaction of dependencies of security assurance requirements
9.3.4 Rationale for chosen security assurance requirements
26 Bibliography
BS EN 419211-5:2013
$142.49