- Protection Profile Name :
-
Secure IC chip for embedded devices
Protection Profile
- Version of PP :
- 1.0
- Technology Type :
- IC chip used for embedded device controller
- Certification No. :
- C0427
- Date :
- 2014-03-31
- Version of Common Criteria:
- 3.1 release4
- Conformance Claim :
- EAL4
- PP Identifier :
- None
- Procurement Entity :
- -
- Sponsor :
- Electronic Commerce Security Technology Research Association
-
- POC :
- Yasuyoshi Uemura
- Division :
- Phone :
- +81-3-5259-8077
- E-mail :
-
- Evaluation Facility :
- ECSEC Laboratory Inc. Evaluation Center
- CC Certificate Image :
(405 KB)(2014-05-12)
PRODUCT DESCRIPTION
Description of PP
The PP provides security requirements for an IC chip used for embedded device controller.
The TOE includes the cryptographic function within it. The cryptographic function is invoked from software of the embedded device. Above function is used for data protection of the device or for other cryptographic services.
For the access control against unintentional external entity, TOE provides the cryptographic function to the embedded device software and also the functionality to restrict use of the cryptographic function only to the authorized embedded device software.
PP security functionality
In the PP, security functions are required to maintain (1) confidentiality of the user data inside embedded device controller, and (2) integrity of embedded device services depending on cryptography.
The main security features of the TOE are as follows:
- Cryptographic functionality
Cryptographic functions can be used (1) for embedded device software to protect its assets from being disclosed and/or tampered, or (2) to be used in mutual authentication between the embedded device and other IT devices. - Access control for cryptographic functionality
Enforces that external entities’ requests to use cryptographic functions are processed only when the requests are verified by using TOE internal data for verification. - Random number Generation
Generates random numbers with the properties required for mechanisms of security functions, while resisting against the ability to predict the random numbers. - Protection against physical attacks
- Protects TSF from the following physical attacks:
- Leak of the information processed inside the TOE, through the power consumption
and/or electromagnetic emanation - Physical tampering and/or probing
- Malfunction due to environmental stress or fault injection attacks using e.g. LASER.
- Leak of the information processed inside the TOE, through the power consumption