FIPS 140-2 Level 3 Security Policy Of Java Card Platform .

3y ago
47 Views
2 Downloads
1.61 MB
58 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Braxton Mach
Transcription

FIPS 140-2 Level 3Security Policy of JavaCard PlatformImplementation forInfineon on SLE 78 (SLJ52GxxyyyzR) V1.0fAugust 2015Version 2.3Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3Copyright 2014, Oracle and/or its affiliates. All rights reservedThis document may be freely reproduced and distributed whole and intact, including this copyright notice.1

Title: Security Policy of Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR),v1.0fContributing Authors: Roland Atoui, Clifford WayneOracle CorporationWorld Headquarters500 Oracle ParkwayRedwood Shores, CA 94065U.S.A.Worldwide Inquiries:Phone: 1.650.506.7000Fax: 1.650.506.7200oracle.comCopyright 2014, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only andthe contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any otherwarranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability orfitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations areformed either directly or indirectly by this document.CIPURSE is a registered trademark of the OSPT - Open Standard for Public Transportation Alliance e.V.Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3Copyright 2014, Oracle and/or its affiliates. All rights reservedThis document may be freely reproduced and distributed whole and intact, including this copyright notice.2

ContentsContents . 112Introduction . 51.1Context . 51.1Distribution Policy . 61.2Document Structure . 6Cryptographic Module Overview. 72.1CM Description . 72.1.1 CM Purpose. 92.1.2 Core Functionalities. 92.1.2.1Applet Downloading. 92.1.2.2Card Management . 92.1.2.3Services to Applets .102.1.3 Security Level .103Cryptographic Module Specification .113.1CM Architecture .113.1.1 IC Hardware and Firmware .123.1.2 Java Card Platform.133.2Cryptographic Boundary .143.3CM Cryptographic Functions .143.3.1 Cryptographic Keys.153.3.2 Public Keys .173.3.3 PIN .173.3.4 Audit events and data .173.4FIPS 140-2 Approved Modes of Operation .173.4.1 Versions and Mode of Operation .183.4.2 CM Identification .194Cryptographic Module Ports and Interfaces .21Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3This document may be freely reproduced and distributed whole and intact, including this copyright notice.1

4.1Communication Interfaces .214.1.1 Logical Interfaces .214.1.2 Physical Interfaces .224.25Packages .25Roles, Services and Authentication .275.1Roles .275.2Services .285.2.1 Card Management Services Available to off Card Entities .285.2.1.1Non Authenticated Services .295.2.1.2Services Requiring Authentication and Manipulating CSPs .295.2.2 Cryptographic Services Available via Java Card API .305.2.2.1FIPS 140-2 Approved Algorithms .316Security Requirements .336.1Identification and Authentication of Roles .336.1.1 Identification.336.1.2 Authentication .336.2Integrity and Confidentiality of Loaded Application Code.346.3Authentication of Loaded Application Code .346.3.1 DAP Verification.346.4CSP Secure Management.356.4.1 Cryptographic Key and PIN Entry .356.4.2 Cryptographic Keys and User PIN Contents Zeroization .356.4.3 Key Generation .356.4.4 Key Loading .356.4.5 Key Storage .356.4.6 Key Establishment .366.4.7 Key Distribution .367Physical Security .377.18Physical Security Mechanisms.37Mitigation of Other Attacks .388.1Power and Electromagnetic Analysis Attacks .388.1.1 Countermeasures .388.2Timing Analysis Attacks .398.2.1 Countermeasures .398.3Fault Induction Attacks .39Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3This document may be freely reproduced and distributed whole and intact, including this copyright notice.2

8.3.19Countermeasures .39Self-Tests .419.1Power Up Self -Tests .419.1.1 Deterministic Random Number Generator Test .419.1.2 Cryptographic Algorithm Known Answer Tests.429.1.3 Software/Firmware Integrity KAT .429.1.4 Critical Functions Tests .429.2Conditional Self-Tests.429.2.1 Pair-wise Consistency Test (for public and private keys) .429.2.2 Firmware Load Test. .429.2.3 Key Entry Tests.439.2.4 Continuous RNG Testing .439.2.5 Bypass Testing .4310Security Policy - Check List Tables .4410.1Roles and Required Identification and Authentication .4410.2Strength of Authentication Mechanisms .4410.3Services Authorized for Roles .4510.4Access Rights Within Services.4510.5Physical Security Requirements.4810.6Mitigation of Other Attacks.48AReferences .49BAcronyms .52Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3This document may be freely reproduced and distributed whole and intact, including this copyright notice.3

List of TablesTable 1: Security Level. 10Table 2: Cryptographic Algorithms. 15Table 3: Critical Security Parameters - Secret Symmetric Keys. 16Table 4: Critical Security Parameters - Public Assymetric Keys. 17Table 5: Critical Security Parameters - Global PIN . 17Table 6: Critical Security Parameters - Counters. 17Table 7: Product and Package Combination . 18Table 8: Versions and Mode of Operations Indicators . 19Table 9: Tag ‘DF10’ . 20Table 10: Tag ‘DF11’ . 20Table 11: Logical Interface . 21Table 12: CM ISO 7816 Interface Contact Assignments . 23Table 13: IC Pad Descriptions and Logical Interface Types. 24Table 14: Logical Interfaces With Physical Interface Connections . 25Table 15: Supported Packages . 26Table 16: Roles . 28Table 17: Unauthenticated Services. 29Table 18: Card Content Manager Services and their CSP Usage. 30Table 19: Cryptographic Services and Authentication services available to applet through the standardJava Card API . 31Table 20: FIPS Approved Cryptographic Algorithms . 32Table 21: Roles and Required Identification and Authentication - Check-List. 44Table 22: Strength of Authentication Mechanisms - Check-List . 44Table 23: Services Authorized for Roles - Check-List . 45Table 24: Access Rights Within Services - Check-List . 48Table 25: Physical Security Requirements - Check-List. 48Table 26: Mitigation of Other Attacks - Check-List . 48Table of FiguresFigure 1. CM Architecture Overview . 11Figure 2. Cryptographic Boundary – Hardware Architecture . 12Figure 3. Relationship of CM Software Module and Supporting Applications. 13Figure 4. Cryptographic Module Boundary. 14Figure 5: ISO 7816 Interface Contact Pad Designations and Locations . 23Figure 6: IC Die Pad Designations and Locations. 24Security Policy for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0fVersion 2.3This document may be freely reproduced and distributed whole and intact, including this copyright notice.4

CHAPTER1IntroductionThis document describes how the Cryptographic Module (CM) meets a

This Security Policy describes how the Dual Interface Security Controller SLE78 and Java Card Platform binary code meets the security requirements of FIPS 140-2 and CM’s operation in a secure FIPS 140-2 mode. This policy was prepared as part of the Level 3 FIPS 140-2 validation of the module. FIPS 140-2

Related Documents:

Wireless Access Points with FIPS 140-2 Level 2 validation from Aruba Networks. This security policy describes how the AP meets the security requirements of FIPS 140-2 Level 2, and how to place and maintain the AP in a secure FIPS 140-2 mode. This policy was prepared as part of the FIPS 140-2 Level 2 validation of the product.

FIPS 140-2 Security Policy KeyPair FIPS Object Module for OpenSSL Page 4 of 18 1 Introduction This document is the non-proprietary security policy for the KeyPair FIPS Object Module for OpenSSL (FIPS 140-2 Cert. #3503), hereafter referred to as the Module. The Module is a software library providing a C language application program interface (API) for use by

FIPS 140-2 mode. This policy was prepared as part of the Level 2 FIPS 140-2 validation of the module. Note This document may be copied in its entirety and without modification. All copies must include the copyright notice and statements on the last page. FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security .

918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPS mode bit was set. While the

LogRhythm FIPS Object Module FIPS 140-2 Security Policy Page 3 of 33 References Reference Full Specification Name [ANS X9.31] Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA) [FIPS 140-2] Security Requirements for Cryptographic modules, May 25, 2001 [FIPS 180-4] Secure Hash Standard

security policy describes the Nokia VPN Appliance and describes how it meets the security requirements of FIPS 140-2. It also describes how to run the module in an Approved FIPS 140-2 mode of operation. This document was prepared as part of the FIPS 140-2 Level 2 validation of the module.

FortiOS 5.2 FIPS 140-2 Security Policy 01-525-296259-20151016 2 Overview This document is a FIPS 140-2 Security Policy for Fortinet Incorporated’s FortiOS 5.2 firmware, which runs on the FortiGate family of security appliances. This policy describes how the FortiOS 5.2 firmware (hereafter referred to as the ‘module’) meets the FIPS 140-2

Ratio 104 121 143 165 195 231 273 319 377 473 559 649 731 841 1003 1247 1479 1849 2065 2537 3045 3481 4437 5133 6177 7569 50 Hz 60 Hz 13.9 12.0 10.1 8.79 7.44 6.28 5.31 4.55 3.85 3.07 2.59 2.23 1.98 1.72 1.45 1.16 0.98 0.754 0.702 0.572 0.476 0.417 0.327 0.282 0.235 0.192