22
Copyright (C) 2007, Canon Inc. All rights reserved. P. 1 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view Nobuhiro TAGASHIRA Canon Inc.

Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

Embed Size (px)

Citation preview

Page 1: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

Copyright (C) 2007, Canon Inc. All rights reserved. P. 1

A Study onthe Cryptographic Module

Validationin the CC Evaluation

from Vendors' point of view

Nobuhiro TAGASHIRA

Canon Inc.

Page 2: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 2Copyright (C) 2007, Canon Inc. All rights reserved.

Contents

1. Background2. The Common Criteria Evaluation

vs The Cryptographic Module Validation1. Proposal 1 (Developer’s Explanation)2. Proposal 2 (new framework)3. Conclusion

Page 3: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 3Copyright (C) 2007, Canon Inc. All rights reserved.

Background in Japan

•Common Criteria (CC) Evaluation :In 2001, JISEC was establishedIn 2003, JISEC became a member of CCRA

•Cryptographic Module (CM) Validation :In 2006, JCMVP was started a shadow testing

In 2007, JCMVP was established

* JISEC : Japan Information Technology Security Evaluation and Certification Scheme* JCMVP : Japan Cryptographic Module Validation Program

Page 4: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 4Copyright (C) 2007, Canon Inc. All rights reserved.

Activities in Canon

•Common Criteria (CC) Evaluation :CCEVS-VR-04-0063 from CCEVS (US Scheme)C0010/C0012/C0020/C0027/C0032/C0036/ C0050 from JISEC

•Cryptographic Module (CM) Validation :F0002 from JCMVP

Page 5: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 5Copyright (C) 2007, Canon Inc. All rights reserved.

The Common Criteria Evaluation

•Standard : ISO/IEC 15408 (Common Criteria)

•Methodology : CEM•Target : TOE (a set of S/W, F/W and/or

H/W)•Top Description : Security Target•Flow : ST Evaluation -> TOE Evaluation•Levels : EAL1 to EAL7•Action : Evaluation•Etc : 8 Security Assurance Classes

Page 6: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 6Copyright (C) 2007, Canon Inc. All rights reserved.

The Cryptographic Module Validation

•Standard : ISO/IEC 19790 (FIPS 140-2)•Methodology : DTR (Derived Test

Requirements)•Target : Cryptographic Module•Top Description : Security Policy•Flow : Algorithm Testing -> Module Testing•Levels : Security Level 1 to 4•Action : Testing•Etc : 11 security areas

Page 7: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 7Copyright (C) 2007, Canon Inc. All rights reserved.

CC Evaluation vs CM Validation

•The CC Evaluation and CM Validation are different in

AbstractnessFocus of tests [B2-04]

[B2-05]

[B2-04] Nithya Rachamadugu, “FIPS-US Cryptographic Testing Standard”, ICCC 2005[B2-05] Axel Boness, “A FIPS 140-2 evaluation could authorize CC-like tests”, ICCC 2005

•But these are the same in the point of the view of Third Party Validation Scheme in the IT security world.

•In some cases, the CM validation is very effective in the cryptographic functionality of the CC Evaluation.

Page 8: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 8Copyright (C) 2007, Canon Inc. All rights reserved.

•Question!Have the CC Evaluation and CM validation produced a synergistic effect?

•Answer

NO

Page 9: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 9Copyright (C) 2007, Canon Inc. All rights reserved.

Problems and Countermeasuresunder the CC Evaluation and CM Validation

•Problems1. It is difficult for an end user to understand the validity of the CC Evaluation and CM Validation.

•CountermeasuresCNTM1. A developer has to explain the validity of the CC Evaluation and CM Validation to an end user in the ST.

CNTM2. The CC Specifications has to define the new framework for using the CM Validation.

Page 10: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 10Copyright (C) 2007, Canon Inc. All rights reserved.

Proposal 1 for CNTM1 (Developer’s Explanation)

•Write a ST, which clearly describes the TOE and the CM, so that an end user can understand.

•Point :It is NOT necessary to change a structure of the ST.

There are some sections, which describes the CM.

Page 11: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 11Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 1) for Proposal 1

ST referenceTOE reference

Identify the Cryptographic Module,which is in the TOE.

TOE overviewTOE description

In the description of the physical scope of the TOE, describe the physical scope of the CM, and a relationship between the TOE and the CM.

In the description of the logical scope of the TOE, describe the logical scope of the CM, and a relationship between the TOE and the CM.

If the CM has some modes of the operation (e.g. CMVP mode), describe the usages of the modes of the operation of the CM in the logical description.

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

Page 12: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 12Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 2/3/4/5) for Proposal 1

Conformance claimsSecurity problem definitionSecurity objectivesExtended components definition

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

Same descriptions as the normal ST

Page 13: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 13Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 6.1) for Proposal 1

Security functional requirements“Refinement operations” are required.

e.g. From “The TSF shall …” to “The TSF (CM) shall …”.

If the ST selects some componentsfrom FCS/FPT classes, the developer has to do “Refinement operations” of the requirement that the CM enforces.

– FCS_COP : Cryptographic services

– FCS_CKM : Cryptographic key management

– FPT_TST : Self-tests

– FPT_PHP : Physical security

(if the CM is validated at the level 3 or 4)

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

Page 14: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 14Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 6.1) (con’t)

Security functional requirements If the CSPs in CM are user data of the TOE,

the developer may have to do“Refinement operations” ofsome components in FDP classes.

If the CSPs in CM are TSF data,the developer may have to do “Refinement operations” of some components in FMT classes.

If the CM is validated at the level 1 or higher, especially level 3 or 4, the developer may have to do “Refinement operations” of some components in FIA classes.

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

CSP : Critical Security Parameter. (e.g. Cryptographic keys, authentication data)

Page 15: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 15Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 6.2/6.3) for Proposal 1

Security assurance requirementsSecurity requirements rationale

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

Same descriptions as the normal ST

Page 16: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 16Copyright (C) 2007, Canon Inc. All rights reserved.

ST Description (Chap. 7) for Proposal 1

TOE summary specification

Same descriptions as the normal ST

Security Target

ST introduction

Conformance claims

Security problem definition

Security objectives

Extended components definition

Security requirements

TOE summary specification

Page 17: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 17Copyright (C) 2007, Canon Inc. All rights reserved.

Proposal 2 for CNTM2 (new framework)

•Define the new CC framework, which effectively reuse the CM Validation.

•Point :The Cryptographic Module may be a COTS product, and a developer may be a user of that. In this case, it is difficult for the developer to make design documents for the CC Evaluation.

This situation is a very similar problem to a composed TOE, so we could use the same analogy as ACO class.

Page 18: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 18Copyright (C) 2007, Canon Inc. All rights reserved.

Study 1 (I/F, functionality) for Proposal 2

Interfaces and functionalities of the CMare tested while testing.

There are NO big impact on Composition rationale (ACO_COR),Development evidence (ACO_DEV),

Reliance of dependent component (ACO_REL),And Composed TOE testing (ACO_CTT).

Page 19: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 19Copyright (C) 2007, Canon Inc. All rights reserved.

Study 2 (vulnerability) for Proposal 2

There are no vulnerability analysis of the CM.

There are big impact onComposition vulnerability analysis (ACO_VUL).

Page 20: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 20Copyright (C) 2007, Canon Inc. All rights reserved.

Countermeasures for Proposal 2

1. Propose to ISO/IEC 19790 WG that vulnerability analysis is tested while testing the CM.

or

2. Define a new family that supports a new Composition vulnerability analysis (ACO_VUL) for an independent cryptographic module test.

Page 21: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 21Copyright (C) 2007, Canon Inc. All rights reserved.

Conclusion

•This paper showsthe problem between the CC Evaluation and the CM Validation.

the proposal for the developer, and CC schemes.

•This paper is also useful, during the acquisition of the some CC/CM validated products.

•Future workWe have to examine a proposal 2 in detail in the viewpoint of feasibility.

FIPS 140-3 is planned. We have to examine between the CC Evaluation and the new CM Validation.

Page 22: Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view

P. 22Copyright (C) 2007, Canon Inc. All rights reserved.

Thank you

Nobuhiro [email protected]

Canon Inc.