throbber
UK IT SECURITY EVALUATION AND
`CERTIFICATION SCHEME
`
`122-B
`
`CERTIFICATION REPORT No. P165
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`has been evaluated under the terms of the Scheme
`
`and complies with the requirements for
`
`EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
`
`Issue 1.0
`
`March 2002
`
`© Crown Copyright 2002
`
`Reproduction is authorised provided the report
`is copied in its entirety
`
`UK IT Security Evaluation and Certification Scheme
`Certification Body, PO Box 152
`Cheltenham, Glos GL52 5UF
`United Kingdom
`
`Page 1 of 27
`
`GOOGLE EXHIBIT 1014
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`ARRANGEMENT ON THE
`MUTUAL RECOGNITION OF COMMON CRITERIA CERTIFICATES
`IN THE FIELD OF INFORMATION TECHNOLOGY SECURITY
`
`(CCRA)
`
`The Certification Body of the UK IT Security Evaluation and Certification Scheme is a
`member of the above Arrangement and as such this confirms that the Common Criteria
`certificate has been issued by or under the authority of a Party to this Arrangement and is
`the Party’s claim that the certificate has been issued in accordance with the terms of this
`Arrangement.
`
`The judgements contained in the certificate and Certification Report are those of the
`Qualified Certification Body which issued it and of the Evaluation Facility which carried
`out the evaluation. There is no implication of acceptance by other Members of the
`Agreement Group of liability in respect of those judgements or for loss sustained as a
`result of reliance placed upon those judgements by a third party.
`
`Trademarks:
`
`The following trademarks are acknowledged:
`
`Sony Corporation
`
`All other product or company names are used for identification purposes only and may be trademarks of their
`respective owners.
`
`Page ii
`
`Issue 1.0
`
`March 2002
`
`Page 2 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`CERTIFICATION STATEMENT
`
`FeliCa RC-S860 is a Contactless Smart Card developed by Sony Corporation.
`
`FeliCa RC-S860 (Sony CXD9559, ROM Version 6, OS Version 3.1) has been evaluated under
`the terms of the UK IT Security Evaluation and Certification Scheme and has met Common
`Criteria Part 3 requirements of Assurance Level EAL4 for the specified Common Criteria Part 2
`functionality. The Security Target did not invoke CC augmented assurance or extended
`functionality.
`
`Protection Profile claims were not invoked in the Security Target.
`
`Given the nature of threats to smartcards, the “Important Notice for Customers FeliCa RC-S860”
`[z] and “Sony FeliCa RC-S860 Hardware Evaluation Report, Datacard Group” [o] should be
`consulted to allow a proper risk analysis to be performed before FeliCa RC-S860 is deployed.
`
`Originator
`
`CESG
`Certifier
`
`CESG
`Approval
`and Authorisation Head of the Certification Body
`
`Date authorised
`
`4 March 2002
`
`March 2002
`
`Issue 1.0
`
`Page iii
`
`Page 3 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`(This page is intentionally left blank)
`
`Page iv
`
`Issue 1.0
`
`March 2002
`
`Page 4 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`TABLE OF CONTENTS
`
`CERTIFICATION STATEMENT .............................................................................................iii
`
`TABLE OF CONTENTS..............................................................................................................v
`
`ABBREVIATIONS .....................................................................................................................vii
`
`REFERENCES.............................................................................................................................ix
`
`I.
`
`EXECUTIVE SUMMARY .................................................................................................1
`Introduction............................................................................................................................1
`Evaluated Product ..................................................................................................................1
`TOE Scope.............................................................................................................................1
`Protection Profile Conformance ............................................................................................2
`Assurance...............................................................................................................................2
`Strength of Function Claims..................................................................................................2
`Security Policy.......................................................................................................................2
`Security Claims......................................................................................................................2
`Evaluation Conduct................................................................................................................3
`Certification Result................................................................................................................4
`General Points........................................................................................................................4
`II. EVALUATION FINDINGS................................................................................................5
`Introduction............................................................................................................................5
`Architectural Information ......................................................................................................5
`Security Policy Model ...........................................................................................................5
`Delivery .................................................................................................................................5
`Guidance Documentation ......................................................................................................7
`Strength of Function ..............................................................................................................7
`Vulnerability Analysis ...........................................................................................................7
`IT Product Testing .................................................................................................................7
`Software Testing....................................................................................................................7
`Hardware Testing...................................................................................................................8
`III. EVALUATION OUTCOME ..............................................................................................9
`Certification Result................................................................................................................9
`Recommendations..................................................................................................................9
`ANNEX A: EVALUATED CONFIGURATION .....................................................................11
`
`ANNEX B: PRODUCT SECURITY ARCHITECTURE .......................................................13
`
`March 2002
`
`Issue 1.0
`
`Page v
`
`Page 5 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`(This page is intentionally left blank)
`
`Page vi
`
`Issue 1.0
`
`March 2002
`
`Page 6 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`ABBREVIATIONS
`
`Common Criteria
`
`Common Evaluation Methodology
`
`Communications-Electronics Security Group
`
`Commercial Evaluation Facility
`
`Chemo-Mechanical Polishing
`
`Central Processing Unit
`
`Arrangement on the Mutual Recognition of Common Criteria Certificates
`in the field of Information Technology Security
`
`Confocal Scanning Microscope
`
`Data Encryption Standard
`
`Triple DES operation. A 3DES encryption uses two keys in an Encrypt-
`Decrypt-Encrypt sequence.
`
`Differential Fault Analysis
`
`Differential Power Analysis
`
`Evaluation Assurance Level
`
`CC
`
`CEM
`
`CESG
`
`CLEF
`
`CMP
`
`CPU
`
`CCRA
`
`CSM
`
`DES
`
`3DES
`
`DFA
`
`DPA
`
`EAL
`
`EEPROM Electrically Erasable Programmable Read Only Memory
`
`ETR
`
`FD
`
`FIB
`
`Evaluation Technical Report
`
`Floppy Disk
`
`Focused Ion Beam
`
`GPIB
`
`General Purpose Interface Bus
`
`IC
`
`ID
`
`Integrated Circuit
`
`Identity
`
`IDm
`
`Manufacturer ID
`
`ITSEC
`
`Information Technology Security Evaluation Criteria
`
`JIL
`
`Joint Interpretation Library
`
`March 2002
`
`Issue 1.0
`
`Page vii
`
`Page 7 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`LFSR
`
`Linear Feedback Shift Register
`
`LSI
`
`OR
`
`OSP
`
`PET
`
`PGP
`
`PP
`
`RAM
`
`RISC
`
`RNG
`
`ROM
`
`RF
`
`SFR
`
`SoF
`
`SPM
`
`TOE
`
`TSF
`
`TSFI
`
`Large Scale Integration
`
`Observation Report
`
`Organizational Security Policy
`
`Poly Ethylene Terephthalate
`
`Pretty Good Privacy
`
`Protection Profile
`
`Random Access Memory
`
`Reduced Instruction Set Computer
`
`Random Number Generator
`
`Read Only Memory
`
`Radio Frequency
`
`Security Functional Requirement
`
`Strength of Function
`
`Security Policy Model
`
`Target of Evaluation
`
`TOE Security Functions
`
`TOE Security Functions Interface
`
`UKSP
`
`United Kingdom Scheme Publication
`
`Page viii
`
`Issue 1.0
`
`March 2002
`
`Page 8 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`REFERENCES
`
`a.
`
`FeliCa RC-S860 Contactless Smart Card Security Target,
`Sony Corporation,
`Version 2.0, 860-ST-E02-00, 12 December 2001.
`
`b. Description of the Scheme,
`UK IT Security Evaluation and Certification Scheme,
`UKSP 01, Issue 4.0, February 2000.
`
`c.
`
`The Appointment of Commercial Evaluation Facilities,
`UK IT Security Evaluation and Certification Scheme,
`UKSP 02, Issue 3.0, 3 February 1997.
`
`d. Common Criteria Part 1,
`Common Criteria Interpretations Management Board,
`CCIMB-99-031, Version 2.1, August 1999.
`
`e.
`
`f.
`
`g.
`
`Common Criteria Part 2,
`Common Criteria Interpretations Management Board,
`CCIMB-99-032, Version 2.1, August 1999.
`
`Common Criteria Part 3,
`Common Criteria Interpretations Management Board,
`CCIMB-99-033, Version 2.1, August 1999.
`
`Common Methodology for Information Technology Security Evaluation,
`Part 2: Evaluation Methodology,
`Common Criteria Evaluation Methodology Editorial Board,
`Version 1.0, CEM-099/045, August 1999.
`
`h. Common Criteria: Interpretation-069: Informal Security Policy Model, 30 March 2001.
`
`i.
`
`j.
`
`k.
`
`Joint Interpretation Library, The Application of CC to Integrated Circuits,
`JIL,
`V1.0, January 2000.
`
`Joint Interpretation Library, Integrated Circuit Hardware Evaluation Methodology,
`Vulnerability Assessment,
`JIL,
`Version 1.3, April 2000.
`
`Final Evaluation Technical Report for LFL/T141,
`Logica CLEF,
`Issue 1.0, CLEF.25909/7.2/2, 22 June 2001.
`
`March 2002
`
`Issue 1.0
`
`Page ix
`
`Page 9 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`l.
`
`Evaluation Technical Report Addendum for LFL/T141,
`Logica CLEF,
`Issue 1.0, CLEF.25909/7.2/3, 9 July 2001.
`
`m. EAL4 Evaluation Technical Report for LFL/T141,
`Logica CLEF,
`Issue 1.0, CLEF.25909/7.2/4, 9 November 2001.
`
`n.
`
`o.
`
`p.
`
`EAL4 Evaluation Technical Report Addendum for LFL/T141,
`Logica CLEF,
`CLEF.25909/7.2/5, Issue 1.0, 13 December 2001.
`
`Sony FeliCa RC-S860 Hardware Evaluation Report,
`Datacard Group,
`Issue 1.0, HDCR-DCG-TR-0001, Issue 1.0, 12 December 2001.
`
`Errata for LFL/T141 Hardware Evaluation Report,
`Datacard Group,
`25 January 2002.
`
`q. DES Function Test Procedure for FeliCa RC-S860,
`Sony Corporation,
`860-DTP-E01-00, v1.00, 2 October 2001.
`
`r.
`
`DES Function Test Result for FeliCa RC-S860,
`Sony Corporation,
`860-DTR-E01-00, v1.00, 2 October 2001.
`
`s. DES Function Test Specification for FeliCa RC-S860,
`Sony Corporation,
`860-DTS-E01-00, v1.00, 1 October 2001.
`
`t.
`
`Differential Fault Analysis of Secret Key Cryptosystems,
`Technion – Computer Science Department,
`Technical Report 0910 (Revised 1997)
`E Biham & A Shamir, 1997.
`
`u. Differential Power Analysis,
`Cryptography Research Inc.,
`P Kocher & J Jaffe & B Jun.
`
`v.
`
`FeliCa RC-S860 Developer Vulnerability Analysis,
`Sony Corporation,
`860-VA-E01-20, v1.2, 12 December 2001.
`
`Page x
`
`Issue 1.0
`
`March 2002
`
`Page 10 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`w. Federal Information Processing Standards Publication,
`NIST,
`Security Requirements for Cryptographic Modules, FIPS PUB 140-1, 11 January 1994.
`
`x.
`
`Function Specification FeliCa RC-S860,
`Sony Corporation,
`860-FS-E02-00, v2.0, 10 December 2001.
`
`y. High Level Design FeliCa RC-S860,
`Sony Corporation,
`860-HD-E02-00, v2.0, 10 December 2001.
`
`z.
`
`Important Notice for Customers FeliCa RC-S860,
`Sony Corporation,
`860-IN-E01-10, v1.1, 20 December 2001.
`
`aa. Development Specification Document Product Code: CXD9559-06, 955906-DS-E01-20
`(pre-issue),
`Sony Corporation,
`Rev. 1.2, March 2001.
`
`bb. CXD9559 Mass-Production Test Description,
`Sony Corporation,
`860- MTD-E01-00, v1.0, 1 Oct 2001.
`
`cc. Random Number Generator Function Test Procedure for FeliCa RC-S860,
`Sony Corporation,
`860-RTP-E01-00, v1.00, 2 October 2001.
`
`dd. Random Number Generator Function Test Result for FeliCa RC-S860,
`Sony Corporation,
`860-RTR-E01-00, v1.00, 2 October 2001.
`
`ee. Random Number Generator Function Test Specification for FeliCa RC-S860,
`Sony Corporation,
`860-RTS-E01-00, v1.00, 1 October 2001.
`
`ff. RC-S860 Strength Of Function Analysis,
`Sony Corporation,
`860-SOF-E01-20, Version 1.2, November 20, 2000.
`
`gg. FeliCa Security Reference Manual,
`Sony Corporation,
`M10-E01-20, Version 1.2. December 2001.
`
`March 2002
`
`Issue 1.0
`
`Page xi
`
`Page 11 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`hh. FeliCa Card User’s Manual,
`Sony Corporation,
`M09-E02-01, v2.1, December 2001.
`
`ii.
`
`jj.
`
`FeliCa RC-S860 Delivery Procedure,
`Sony Corporation,
`M12-E02-00, V. 2.0 Draft 1, 13 August 2001.
`
`ISO7810: 1995 Identification Cards – Physical Characteristics
`ISO.
`
`kk. Rewriting Transport Key,
`Sony Corporation,
`FeliCa RC-S860, Tec 10-E01-00, Version 1.0, March 2001.
`
`ll. Card Issue Procedure RC-S860,
`Sony Corporation,
`860-CI-E02-00, Version 2.0, Draft 2, 13 August 2001.
`
`mm. Errata to Sony FeliCa RC-S860 Hardware Evaluation Report,
`Datacard Group,
`Version 1-0, 5 February 2002.
`
`Page xii
`
`Issue 1.0
`
`March 2002
`
`Page 12 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`I.
`
`EXECUTIVE SUMMARY
`
`Introduction
`
`This Certification Report states the outcome of the Common Criteria security evaluation of
`1.
`Sony FeliCa RC-S860, Sony CXD9559, ROM Version 6, OS Version 3.1 to the Sponsor, Sony
`Corporation, and is intended to assist prospective consumers when judging the suitability of the
`IT security of the product for their particular requirements.
`
`Prospective consumers are advised to read this report in conjunction with the Security
`2.
`Target [Reference a] which specifies the functional, environmental and assurance evaluation
`requirements.
`
`Evaluated Product
`
`3.
`
`The version of the product evaluated was:
`
` Sony FeliCa RC-S860, Sony CXD9559, ROM Version 6, OS Version 3.1.
`
`This product is also described in this report as the Target of Evaluation (TOE). The Developer
`was Sony Corporation. Sony subcontracted IC layout and fabrication.
`
`to
`is a compact card, conforming
`The Sony RC-S860 contactless smart card
`4.
`ISO/IEC7810ID-1 dimensions [jj]. An IC chip and antenna are built into the card. The card itself
`operates from low-power electromagnetic signals received from a reader/writer. The card
`contains an 8-bit RISC CPU, combining built-in EEPROM, RAM, ROM, encryption processing
`and RF functions.
`
`The Sony RC-S860 can facilitate unique access rights set by several different service
`5.
`providers. Hence, a single card can be used for a variety of applications whilst assuring
`individual security. Separate, unique keys, providing individual access rights to different
`memory areas on the card, control both dedicated and common files.
`
`6. Details of the evaluated configuration, including the TOE’s supporting guidance
`documentation, are given in Annex A.
`
`7. An overview of the TOE’s security architecture can be found in Annex B.
`
`TOE Scope
`
` The Security Target [a] does not identify specific hardware functions as Security
`8.
`Functions. Rather, the Security Functions of [a] are implemented in firmware. These Security
`Functions were evaluated to EAL4 by the Logica CLEF.
`
`The DES processor and random number generator (RNG) are intrinsic to the
`9.
`implementation of other security functions in the Security Target. Assurance in respect of their
`operation was derived from Developer test evidence and software functional and penetration
`testing. Hardware evaluation to support the Security Target [a] was carried out by Datacard
`
`March 2002
`
`Issue 1.0
`
`Page 1
`
`Page 13 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`Consult p7. The results of the hardware evaluation were only to establish the resistance of the IC
`attacks in the context of the composed TOE represented in [a].
`
`Protection Profile Conformance
`
`10. The Security Target [a] did not claim conformance to any protection profile.
`
`Assurance
`
`11. The Security Target [a] specified the assurance requirements for the evaluation. The
`predefined evaluation assurance level EAL4 with straight VLA.2 was used. Common Criteria
`Part 3 [f] describes the scale of assurance given by predefined assurance levels EAL1 to EAL7
`(where EAL0 represents no assurance). An overview of CC is given in CC Part 1 [d].
`
`Strength of Function Claims
`
`12. The minimum Strength of Function (SoF), applied to cryptographic protocol, was SoF-
`basic. SoF-basic was tied to the use of VLA.2 as in reference [j].
`
`13. The cryptographic mechanisms contained in the TOE, DES and 3DES, are publicly known.
`As such it is the policy of the national authority for cryptographic mechanisms, CESG, not to
`comment on appropriateness or strength. Hence, no comment on the strength of function of DES
`and 3DES by the TOE in respect of encryption/decryption for confidentiality or mutual
`authentication are given.
`
`Security Policy
`
`14. The TOE security policies are detailed in [a]. These cover: identification, data access,
`secure communication and cryptographic standards.
`
`Security Claims
`
`15. The Security Target [a] fully specifies the TOE’s security objectives, threats, OSPs and
`security functional requirements, and security functions to elaborate the objectives. All of the
`SFRs are taken from CC Part 2 [e]; use of this standard facilitates comparison with other
`evaluated products.
`
`16. CC Security Functional Requirements (SFRs) were either tailored, refined or restated to
`reflect the security of the TOE. Security Functions for the TOE were as follows:
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`Cryptographic key generation, FCS_CKM.1
`
`Cryptographic key destruction, FCS_CKM.4
`
`Cryptographic operation, FCS_COP.1
`
`Subset access control, FDP_ACC.1
`
`Security attribute based access control, FDP_ACF.1
`
`Page 2
`
`Issue 1.0
`
`March 2002
`
`Page 14 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`f.
`
`g.
`
`h.
`
`i.
`
`j.
`
`k.
`
`l.
`
`Basic data authentication, FDP_DAU.1
`
`Export of user data without security attributes, FDP_ETC.1
`
`Subset information flow control, FDP_IFC.1
`
`Simple security attributes, FDP_IFF.1
`
`Import of user data without security attributes, FDP_ITC.1
`
`Stored data integrity monitoring, FDP_SDI.1
`
`Underlying abstract machine test, FPT_AMT.1
`
`m. Failure with preservation of secure state, FPT_FLS.1
`
`n.
`
`o.
`
`p.
`
`q.
`
`r.
`
`Inter-TSF confidentiality during transmission, FPT_ITC.1
`
`Inter-TSF detection of modification, FPT_ITI.1
`
`Function recovery, FPT_RCV.4
`
`Replay detection, FPT_RPL.1
`
`Inter-TSF trusted channel, FTP.ITC.1
`
`Evaluation Conduct
`
`17. The evaluation was carried out in accordance with the requirements of the UK IT Security
`Evaluation and Certification Scheme as described in United Kingdom Scheme Publication 01
`(UKSP 01) and UKSP 02 [b, c]. The Scheme has established a Certification Body which is
`jointly managed by the Communications-Electronics Security Group and the Department of
`Trade and Industry on behalf of Her Majesty’s Government. As stated on page ii of this
`Certification Report, the Certification Body is a member of the Common Criteria Mutual
`Recognition Arrangement, and the evaluation was conducted in accordance with the terms of this
`Arrangement.
`
`18. The purpose of the evaluation was to provide assurance about the effectiveness of the TOE
`in meeting its Security Target [a], which prospective consumers are advised to read. To ensure
`that the Security Target gave an appropriate baseline for a CC evaluation, it was first itself
`evaluated. The TOE was then evaluated against this baseline. The evaluation was performed in
`accordance with CC Part 3 [f] and the Common Evaluation Methodology (CEM) [g].
`Additionally, [i, j] were used to interpret CC for ICs.
`
`19. EAL3 evaluation of the TOE, excluding some vulnerability analyses and hardware
`penetration testing, commenced in November 2000 and ended in June 2001. Complete
`vulnerability analyses and the hardware and EAL4 delta evaluations (to include some additional
`security functions), started in July 2001 and completed in December 2001.
`
`March 2002
`
`Issue 1.0
`
`Page 3
`
`Page 15 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`20. The Certification Body monitored the evaluation which was carried out by the Logica
`Commercial Evaluation Facility (CLEF) and Datacard Consult p7. The evaluation was
`completed when the CLEF submitted the Addendum to the Evaluation Technical Report (ETR)
`[m] and Datacard Consult p7 submitted the Hardware Evaluation Report [o] to the Certification
`Body in November and December 2001 respectively. Following the CLEF and Datacard’s
`response [n, p, mm] to a request for further information, the Certification Body then produced
`this Certification Report.
`
`Certification Result
`
`21. For the certification result see the “Evaluation Outcome” Section.
`
`General Points
`
`22. The evaluation addressed the security functionality claimed in the Security Target [a] with
`reference to the assumed operating environment specified by the Security Target. The evaluated
`configuration was that specified in Annex A. Prospective consumers are advised to check that
`this matches their identified requirements and to give due consideration to the recommendations
`and caveats of this report.
`
`23. Certification is not a guarantee of freedom from security vulnerabilities; there remains a
`small probability (smaller with greater assurance) that exploitable vulnerabilities may be
`discovered after a certificate has been awarded. This Certification Report reflects the
`Certification Body’s view at the time of certification. Consumers (both prospective and existing)
`should check regularly for themselves whether any security vulnerabilities have been discovered
`since this report was issued and, if appropriate, should check with the Vendor to see if any
`patches exist for the product and whether such patches have been evaluated and certified.
`
`24. The issue of a Certification Report is not an endorsement of a product.
`
`Page 4
`
`Issue 1.0
`
`March 2002
`
`Page 16 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`II. EVALUATION FINDINGS
`
`Introduction
`
`25. The evaluation addressed the requirements specified in the Security Target [a]. The results
`of this work were reported in the ETR [k, l, m, n, o, p, mm] under the CC Part 3 [f] headings.
`The following sections note considerations that are of particular relevance to either consumers or
`those involved with the subsequent assurance maintenance and re-evaluation of the TOE.
`
`Architectural Information
`
`26. The CPU connects the device’s various memory (ROM, RAM, EEPROM) via an 8-bit data
`bus. The device contains a voltage regulator with high voltage detector. RNG is a pseudo-
`random number generator implemented in the random logic portion of the IC. (See references [x,
`y, aa].) Refer to Annex B for an overview of software and hardware architecture.
`
`Security Policy Model
`
`27. Common Criteria: Interpretation-069 [h] was followed, allowing the Security Target [a] to
`be taken as providing the Informal Security Policy Model (SPM). The Evaluators confirmed that
`the SPM clearly articulated the security behaviour of the TOE. They noted that although the
`CEM [g] does not require a check of the internal consistency of the informal SPM, the evidence
`for such was provided as part of the Security Target evaluation.
`
`Delivery
`
`28. Customers of the TOE need to be aware of the delivery guidance procedures as detailed by
`Sony in [a, gg, ii, z].
`
`29. The shipping key is required to establish an authentic IC. PGP is used as the distribution
`mechanism for the ROM addition code message digest and the shipping key from the
`manufacturer to the customer.
`
`30. The following diagram illustrates trusted delivery flow procedures. The IC manufacturing
`key protects the IC chip during the manufacturing process. The manufacturing key is required
`whenever information needs to be changed on the card. The IC manufacturing key is changed to
`a shipping key before transportation for protection during transportation. The shipping key is
`changed by the customer to their own customer key before the card can be set-up. Only the
`customer key can be used to set-up the card.
`
`March 2002
`
`Issue 1.0
`
`Page 5
`
`Page 17 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`IC Card Manufacturer
`
`Customer
`
`ROM addition code message digest
`a n d t h e s h i p m e n t k e y r e w r i t i n g
`p a c k a g e a r e e n c r y p t e d b y P G P
`Encryption Tool and sends to the
`customer by electronic mail sepatately.
`
`The customerdoes the following operation on to the card:
`1. Compare ROM addition code message digest which took
`out of the card and the one sent from the manufacture to
`confirm the card has no modification of the code in the
`EEPROM.
`2. Based on the shipment key rewriting package, compare
`the shipment key and rewrite the shipment key to make the
`key that only the customer knows.
`
`ROM addition code
`message digest
`
`The shipment key
`rewriting package
`
`IDM
`writing
`
`IC Card
`
`Message Digest Shipment Key
`
`1. ROM addition code message digest
`
`2. The shipment key rewriting package
`
`Comparison
`and Rewrite
`
`IC Card
`
`IC Card
`
`Message
`Digest
`
`Shipment
`Key
`
`Message
`Digest
`
`Customer
`Key
`
`The card is protected with the shipment key during
`transportation.
`
`At the time of shipment, it saved
`t h e I D M s e r i a l n u m b e r
`correspondence on the FD for
`e v e r y 1 0 0 0 I C c a r d s , a n d
`packed up in the same carton
`box of the card.
`
`As compared with the correspondence table
`appended in IDM and the serial number of the
`card, it can perform authentication of loss of the
`card after arrival at the customer.
`
`It is the double security measure such as the shipment key during transportation and
`comparison of IDM, serial number and ROM message digest after arrival at the
`customer.
`
`Page 6
`
`Issue 1.0
`
`March 2002
`
`Page 18 of 27
`
`

`

`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`EAL4
`
`Guidance Documentation
`
`31. References [gg, hh] should be adhered to when developing applications for use with the
`TOE or deploying the TOE operationally; it should be noted, however, that the TOE does not
`support application download. The Certifier draws particular attention to Reference [z], which
`alerts customers to the need to consider certain technical attacks when carrying out their risk
`analysis.
`
`Strength of Function
`
`32. The SoF claim for the TOE was as given above under “Strength of Function Claims”.
`Based on their examination of all the evaluation deliverables, the Evaluators confirmed that there
`were no probabilistic or permutational mechanisms in the TOE other than DES, 3DES and RNG,
`and that therefore the SoF claim of SoF-basic was upheld as claimed in [ff].
`
`Vulnerability Analysis
`
`33. The Evaluators’ vulnerability analysis was based on public domain sources, Developer
`supplied evidence [v] and the visibility of the TOE given by the evaluation process [k, l, m, n, o,
`p, z].
`
`IT Product Testing
`
`34. The correspondence between the tests specified in the Developer’s test documentation and
`the IT Security Functions specified in the Functional Specification [x], and between the tests and
`the High Level Design [y], was complete and accurate in terms of the coverage of the Security
`Functions and High Level Design. Although the Evaluators identified some additional tests in
`the test documentation that were not identified in the Developer’s mappings, the Evaluators were
`nevertheless satisfied that the tests were suitable to demonstrate the expected behaviour of the
`Security Functions. These tests were subsequently brought under the Developer’s configuration
`control procedures. For each command used in a test, the Developer tested for correct operation,
`error conditions, incorrect entry of the command, incorrect parameters (where appropriate) and
`parameters out of range (where appropriate).
`
`35. The test documentation included the Test Plan and Analysis document, which detailed the
`test descriptions/procedures (including the pre-requisites, test order dependencies and expected
`results), the mapping of Security Functions to test cases, the mapping of High Level Design to
`test cases, the mapping of interfaces to test cases, the test environments, the test tools and the
`actual test results. The test results included the results of regression testing and all test results
`were found to be consistent with the expected results. The Evaluators noted that the test
`environment was consistent with the security environment requirements and assumptions stated
`in the Security Target [a]. (See references [r, bb, cc, dd, ee].)
`
`Software Testing
`
`36. The evaluation was performed in two stages: EAL3; EAL4 top-up. The evaluators
`examined the Internet for any publicly known vulnerabilities on the TOE: no generic
`vulnerabilities relevant to this type of TOE were discovered. CLEF vulnerability analysis and
`
`March 2002
`
`Issue 1.0
`
`Page 7
`
`Page 19 of 27
`
`

`

`EAL4
`
`Sony FeliCa Contactless Smart Card
`RC-S860
`Sony CXD9559, ROM Version 6, OS Version 3.1
`
`penetration testing was carried out at the EAL3 [k, l] stage and after the hardware evaluation had
`concluded [n, o, p, z]. This comprised:
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`Exploiting the capabilities of interfaces to the TOE, or utilities which might interact
`with the TOE;
`
`Examining privileges inheritance or other capabilities that should otherwise be
`denied;
`
`Looking for data stored or inadequately copied to protected areas;
`
`Behaviour examination of the TOE when start-up, closedown or recovery is
`activated;
`
`Behaviour examination of the TOE under extreme circumstances, particularly where
`this could lead to the de-activation or disablement of Security Function;
`
`f.
`
`Investigation of attempts to use the Test Enable command.
`
`37. No exploitable vulnerabilities arose from these tests.
`
`Hardware Testing
`
`38. Datacard Consult p7 carried out testing in the following respects (see references [q, r, s, t,
`u, v, w, x, y, z, aa, bb, cc, dd, ee, ff, gg, hh, ii]):
`
`a. Operational Envelope. Die with antenna were tested by carrying out DES
`calculations at a range of temperatures between –41oC and +85oC, and with variation
`of the distance between card and reader/writer. The intention of this testing was to
`identify conditions which would induce faults in DES calculation (for use in
`differential fault analysis) or which led to unexpected behaviour of the TOE.
`
`b.
`
`Sensor. Visual inspection of the die to identify features that might lead an attacker to
`disable the regulation of voltage by the TOE was conducted.
`
`c. Differential Fault Analysis. The evaluators attempted to introduce faults into DES
`calculations carried out by the IC.
`
`d.
`
`e.
`
`f.
`
`Timing and Power Analysis.
`
`Bus probing. Probing was carried out to examine the ability to extract or modify
`critical data in transit on the bus (e.g. between the CPU and EEPROM).
`
`Test Mode. The TOE passes through a number of test modes during its
`manufacturing process [bb]. In particular, one of the modes enables reading and
`writing of EEPROM. The evaluators found that certain alteration

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket