Certification Report
EAL 4+ (ALC_FLR.2)
Evaluation of
TÃœBÄ°TAK BÄ°LGEM UEKAE
KERMEN PORTABLE v1.0
issued by
Turkish Standards Institution
Common Criteria Certification Scheme
2
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 2 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
TABLE OF CONTENTS
Table of contents .................................................................................................................................2
Document Information .......................................................................................................................3
Document Change Log .......................................................................................................................3
DISCLAIMER.....................................................................................................................................3
FOREWORD.......................................................................................................................................4
RECOGNITION OF THE CERTIFICATE ......................................................................................5
1 EXECUTIVE SUMMARY..............................................................................................................6
2 CERTIFICATION RESULTS.........................................................................................................9
2.1 Identification of Target of Evaluation .........................................................................................9
2.2 Security Policy...............................................................................................................................9
2.3 Assumptions and Clarification of Scope....................................................................................10
2.4 Architectural Information ..........................................................................................................11
2.5 Documentation............................................................................................................................12
2.6 IT Product Testing .....................................................................................................................13
2.7 Evaluated Configuration ............................................................................................................13
2.8 Results of the Evaluation............................................................................................................14
2.9 Evaluator Comments / Recommendations.................................................................................14
3 SECURITY TARGET.....................................................................................................................14
4 GLOSSARY ....................................................................................................................................14
5 BIBLIOGRAPHY...........................................................................................................................15
6 ANNEXES......................................................................................................................................15
3
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 3 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
Document Information
Date of Issue 04.09.2013
Version of Report 1.0
Author Murat ADSIZ
Technical Responsible Mustafa YILMAZ
Approved Mariye Umay AKKAYA
Date Approved 04.09.2013
Certification Report Number 21.0.01/13-028
Sponsor and Developer TÃœBÄ°TAK BILGEM UEKAE
Evaluation Lab TÃœBÄ°TAK BILGEM OKTEM
TOE/ PP Name* Kermen Portable v1.0
Pages 15
Document Change Log
Release Date Pages Affected Remarks/Change Reference
v1.0 04.09.2013 All First released
DISCLAIMER
This certification report and the IT product defined in the associated Common Criteria document
has been evaluated at an accredited and licensed evaluation facility conformance to Common
Criteria for IT Security Evaluation, version 3.1, revision 4, using Common Methodology for IT
Products Evaluation, version 3.1, revision 4. This certification report and the associated Common
Criteria document apply only to the identified version and release of the product in its evaluated
configuration. Evaluation has been conducted in accordance with the provisions of the CCCS, and
the conclusions of the evaluation facility in the evaluation report are consistent with the evidence
adduced. This report and its associated Common Criteria document are not an endorsement of the
product by the Turkish Standardization Institution, or any other organization that recognizes or
gives effect to this report and its associated Common Criteria document, and no warranty is given
for the product by the Turkish Standardization Institution, or any other organization that recognizes
or gives effect to this report and its associated Common Criteria document.
4
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 4 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
FOREWORD
The Certification Report is drawn up to submit the Certification Committee the results and
evaluation information upon the completion of a Common Criteria evaluation service performed
under the Common Criteria Certification Scheme. Certification Report covers all non-confidential
security and technical information related with a Common Criteria evaluation which is made under
the STCD Common Criteria Certification Scheme. This report is issued publicly to and made
available to all relevant parties for reference and use.
The Common Criteria Certification Scheme (CCCS) provides an evaluation and certification
service to ensure the reliability of Information Security (IS) products. Evaluation and tests are
conducted by a public or commercial Common Criteria Testing Laboratory (CCTL) under CCCS’
supervision.
CCTL is a facility, licensed as a result of inspections carried out by CCCS for performing tests and
evaluations which will be the basis for Common Criteria certification. As a prerequisite for such
certification, the CCTL has to fulfill the requirements of the standard ISO/IEC 17025 and should be
accredited by accreditation bodies. The evaluation and tests related with the concerned product have
been performed by TÃœBÄ°TAK BILGEM OKTEM, which is a public CCTL.
A Common Criteria Certificate given to a product means that such product meets the security
requirements defined in its security target document that has been approved by the CCCS. The
Security Target document is where requirements defining the scope of evaluation and test activities
are set forth. Along with this certification report, the user of the IT product should also review the
security target document in order to understand any assumptions made in the course of evaluations,
the environment where the IT product will run, security requirements of the IT product and the level
of assurance provided by the product.
This certification report is associated with the Common Criteria Certificate issued by the CCCS for
Kermen Portable v1.0 whose evaluation was completed on 03.09.2013 and whose evaluation
technical report was drawn up by TÃœBÄ°TAK BILGEM OKTEM (as CCTL), and with the Security
Target document with version no v1.7 of the relevant product.
5
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 5 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
The certification report, certificate of product evaluation and security target document are posted on
the STCD Certified Products List at http://bilisim.tse.org.tr portal and the Common Criteria Portal
(the official web site of the Common Criteria Project).
RECOGNITION OF THE CERTIFICATE
The Common Criteria Recognition Arrangement logo is printed on the certificate to indicate that
this certificate is issued in accordance with the provisions of the CCRA.
The CCRA has been signed by the Turkey in 2003 and provides mutual recognition of certificates
based on the CC evaluation assurance levels up to and including EAL4. The current list of signatory
nations and approved certification schemes can be found on:
http://www.commoncriteriaportal.org.
6
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 6 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
1 - EXECUTIVE SUMMARY
This report constitutes the certification results by the certification body on the evaluation results
applied with requirements of the Common Criteria for Information Security Evaluation.
Evaluated IT product name: Kermen Portable
IT Product version: v1.0
Developer`s Name: TÃœBÄ°TAK BILGEM UEKAE
Name of CCTL : TÃœBÄ°TAK BILGEM OKTEM
Assurance Package : EAL 4+ (ALC_FLR.2)
Completion date of evaluation : 03.09.2013
Kermen Portable is a software only product for file encryption in both Microsoft Windows and
Pardus environments, running on a single user PC. The program requires X.509 certificates in order
to perform encryption operations.
Kermen Portable implements asymmetric encryption by using EnvelopedData format defined in
[RFC 5652] to ensure the confidentiality of the information. It also signs the confidential data
before encrypting in order to detect any loss of integrity. The signing operation is performed again
in accordance with the CMS standard defined in the [RFC 5652]. Encrypted and signed files can be
decrypted and their signatures are validated by Kermen Portable according to the CMS standard.
X.509 certificates are used to identify individuals and perform asymmetric encryption. Kermen
Portable checks the validity of the certificates upon encryption and decryption operations. In order a
certificate to be accepted as valid by Kermen Portable, besides the other structural controls, the
certificate chain must end up with a trusted certificate defined in the certificate store. The trusted
certificates in the store are signed with a private key which is securely stored in a smartcard
belonging to a trusted authority and the public key to validate the signature is embedded in the
source code of the application which is not accessible by the user. Therefore, only the trusted
authority can define which certificates will be accepted as trusted certificates. Certificate validation
is performed according to the steps described in [RFC 5280].
7
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 7 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
Kermen Portable stores also the X.509 user certificates locally in its own certificate store. The
private keys of asymmetric encryption and signing can be either in smartcards or in the certificate
store as encrypted by user defined passwords. User is responsible for the confidentiality of the
stored password. In case of smartcards, the security of the private keys is provided by the
smartcards.
Kermen Portable provides a viewer for the certificate store. By using this viewer, users can view the
stored certificates, import and export them if they need.
Kermen Portable does not remove the confidential data after encrypting it. The secure removal of
the confidential data is out of the scope of this TOE.
TOE major security features for operational use:
• Encryption of files: Files are encrypted using the EnvelopedData method defined in [RFC
5652]. In EnvelopedData, data is symmetrically encrypted and the encryption key is
asymmetrically encrypted for the recipients with their asymmetric public keys. The
symmetric encryption algorithm is AES-CBC with a 256 bit key and asymmetric encryption
algorithm is defined by the certificates of the recipients. It can be either RSA with defined
key size or Elliptic Curve.
• Integrity protection of files: To detect the loss of integrity of data files, encrypted files are
signed by the sender private key just before the encryption. For signing files, again,
cryptographic message syntax is used and SignedData is created as described in [RFC
5652]. The signature algorithm is defined by the sender’s public key placed in the user’s
signature certificate.
• Decryption of files: Encrypted files are decrypted if the user possesses the corresponding
private key in his smart card or certificate store. Only those users who are defined as the
recipient during the encryption process, can decrypt files due to the security functions of
asymmetric encryption.
• Integrity Check of files: Since the encrypted files are also signed by the encryptor, After
decrpytion of the file the result is a signed file to be validated. By this validation the inegrity
of the original data file is ensured.
• Nonrepudiation of files: The private keys used in signing files are associated with a X.509
certificate therefore the identity of the user. By the nature of the signature operation, user
can claim neither that the data is not signed by himself nor that it is modified after signing.
• Key Storage: Soft private keys are stored in the certificate store in password based
encrypted form. For this purpose, the algorithm PBKDF2 described in [RFC 2898]
(PKCS#5) is used.
• Import/Export Keys: Certificates and associated private keys can be imported into and
exported from the certificate store by using Kermen DEPO GUI. In both cases, the user
must provide the stored password.
8
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 8 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
There are 6 assumptions made in the ST regarding the development environment, production
environment, initialization and maintenance environment, use environment. The ST defines one
Organizational Security Policy. There is 2 threat covered by TOE and the operational environment.
The assumptions, the threats and the organizational security policies are described in chapter 3 of
ST in detail.
The results documented in the Evaluation Technical Report (ETR) for this product provide
sufficient evidence that it meets the EAL 4 augmented with ALC_FLR.2 assurance requirements
for the evaluated security functionality. The evaluation was conducted using the Common
Methodology for Information Technology Security Evaluation, Version 3.1 Revision 4, for
conformance to the Common Criteria for Information Technology Security Evaluation, Version 3.1
Revision 4. CCCS declares that the Kermen portable v1.0 evaluation meets all the conditions of the
Arrangement on the Recognition of Common Criteria Certificates and that the product will be listed
on the CCCS Certified Products List (CPL) and the Common Criteria portal (the official website of
the Common Criteria Project).
9
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 9 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
2 CERTIFICATION RESULTS
2.1 Identification of Target of Evaluation
Project Identifier TSE-CCCS-016
TOE Name and Version Kermen Portable v1.0
Security Target Document Title Kermen Portable v1.0 Security Target
Security Target Document
Version
1.7
Security Target Document Date 29.08.2013
Assurance Level EAL 4+ (ALC_FLR.2)
Criteria • Common Criteria for Information Technology Security
Evaluation, Part 1: Introduction and General Model,
Version 3.1, Revision 4, September 2012
• Common Criteria for Information Technology Security
Evaluation, Part 2: Security Functional Components,
Version 3.1, Revision 4, September 2012
• Common Criteria for Information Technology Security
Evaluation, Part 3: Security Assurance Components,
Version 3.1, Revision 4, September 2012
Methodology • Common Methodology for Information Technology
Security Evaluation v3.1 rev4, September 2012
Protection Profile Conformance No
Common Criteria Conformance • Common Criteria for Information Technology Security
Evaluation Part 2: Security functional requirements, Version
3.1, Revision 4, September 2012, conformant
• Common Criteria for Information Technology Security
Evaluation Part 3: Security assurance requirements Version
3.1, Revision 3, September 2012, conformant.
Sponsor and Developer TÃœBÄ°TAK BILGEM UEKAE
Evaluation Facility TÃœBÄ°TAK BILGEM OKTEM
Certification Scheme Turkish Standards Institution
Common Criteria Certification Scheme
2.2 Security Policy
By using Kermen Portable, two or more individuals can exchange electronic documents securely
over unprotected communication paths, e.g. Networks, without risking any unauthorized persons
reading the document. To achieve this, the documents are encrypted before they are sent between
10
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 10 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
the two parties, and are thus made unreadable for anyone who is not included in the recipients of the
document defined by the sender.
The file encryption interface of Kermen Portable is Kermen SUR application. With Kermen SUR,
after configuration, encryption of files performed by the user in just one step. Dragging the files that
will be encrypted onto the application window is sufficient for encryption operation to be
performed.
Likewise, in order to decrypt files that are encrypted for the user, all the user needs is to drag and
drop the encrypted files onto the application window. If the user’s private key stored in a smartcard
then that card must be plugged in for decryption and also while encrypting, to sign the document
with the user’s private signing key, his or her smartcard is needed. For the keys stored in the
certificate store, store password specified by the user is prompted to the user.
2.3 Assumptions and Clarification of Scope
The following conditions are assumed to exist in the TOE operational environment. These
assumptions include essential environmental constraints on the secure use of the TOE. Assumptions
about the intended usage of the TOE;
• The TOE runs on a single user machine with access protected by the TOE environment; i.e.,
only authorised users of the TOE environment may access the TOE. This includes access
control provided by the operating system or equivalent and protection against malware.
• It is assumed that private keys used for decrypting and signing files are of high quality and
are not disclosed to unauthorized users.
• It is assumed that passwords used for accessing the private keys in the certificate store and in
the smart card are of high quality and are not disclosed to unauthorized users.
• The TOE is operated in a physically secure and well managed environment.
11
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 11 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
• The TOE user is trustworthy and trained to manage and perform encryption of classified
information in accordance with any existing security policies and information classification
policies. This means especially that he knows how to classify information and how to deal
with, e.g., encrypting all files containing sensitive information with the appropriate key
before exporting the file out of the TOE and/or its TOE environment.
• The single user PC on which the TOE is running is not connected directly to an untrusted
network. This means that the PC is either assumed not to be connected to any networks or it
is connected to a trusted network which is protected against attacks, so that no
undocumented security critical side effects on the security functions of the TOE, which are
resided in the PC, are assumed coming from this network.
2.4 Architectural Information
The target of evaluation is limited to the software application Kermen Portable, version 1.0,
developed by TÃœBÄ°TAK BÄ°LGEM. Kermen Portable consists of three parts: Kermen SUR which is
a file encryption GUI, Kermen DEPO which is the viewer GUI for the certificate store and the
underlying API responsible for all of the cryptographic work. API depends on Crypto++ and
OpenSLL crypto libraries which are open source.
The GUI applications do only forward user request to the API and they can’t implement any
cryptographic mechanism or other operations. For example, Kermen SUR’s the only job is to
identify for the underlying API what operation to perform on which file. Therefore the GUI
component is not security critical. In the following picture the architecture of TOE Kermen Portable
and its boundaries are shown.
12
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 12 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
Figure : TOE Architecture and Boundaries
The physical scope of the TOE includes digital files of the application executables and APIs , user’s
encrypted files and log files. These files are assumed to be protected by the physical medium they
are stored and by the underlying operating system.
2.5 Documentation
Kermen Portable v1.0 Security Target v1.5
Kermen Portable v1.0 Kullanım Kılavuzu v1.01
Kermen Portable v1.0 Teslim Dökümanı v1.1
13
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 13 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
2.6 IT Product Testing
Developer tests effort: Description and tests results, the developer scheduling, description and test
results are documented in Kermen Portable v1.0 Test Document. The approach defined in these
documents for TSFIs and depth testing is adequate to check whether the TOE behaves as described
in the design documentation. The approach is oriented to test the interfaces and subsystems as they
are detailed in Software Functional Specification Document, Design Document. The setup and
procedures for the test cases allows demonstrating that the behavior of each subsystem is checked.
Evaluator tests effort:
Repeating Developer Tests:
• The evaluator has repeated the cases specified by the developer in the test documentation
and has compared the obtained results with those obtained by the developer and documented
in each associated report.
• The test repetition performed by the evaluator has demonstrated that the test plan and report
provided by the vendor contains information enough to make a reader able to repeat all tests
included.
Independent Test Strategy:
• The main objective of the test performed by the evaluator is to check that the security
functional requirements are implemented as expected, that the subsystems defined behave as
expected, and that the TSFIs definitions are consistent with the TOE.
• The evaluator has chosen a subset of tests and an appropriate strategy for the TOE delivered
by the developer. The evaluator has also considered the information coming from the
security functional requirements in the security target.
• The evaluator has designed a set of tests following a suitable strategy for the TOE type.
• The evaluator has carried out tests with parameters of the TSFIs and subsystems that could
have special importance in the maintenance of the TOE security. The evaluator has designed
his TSFIs and subsystems independent test cases including all the security requirements
defined in ST.
• All the test cases have been performed using the external interfaces that allow testing
appropriately both the SFRs defined in ST and the subsystems.
• The evaluator has executed for TOE, all the tests cases defined in the independent test plan
and the results obtained have been documented and referenced in this ETR.
2.7 Evaluated Configuration
The TOE configuration used in the penetration testing is consistent with the evaluated configuration
according to security target
The evaluator has defined the test cases taking into account the security requirements defined in ST
and the external interfaces defined in Software Functional Specifications.
14
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 14 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
Kermen Portable requires Windows XP or newer versions of Microsoft windows installed on the
target machine. No installation required in order to run Kermen Portable. Only copying program files is
sufficient.
2.8 Results of the Evaluation
All evaluator actions are satisfied for the evaluation level of EAL 4+ (ALC_FLR.2) as defined by
the Common Criteria and the Common Methodology. The overall verdict for the evaluation is
PASS. The results are supported by evidence in the ETR. There is no residual vulnerability for this
product. TOE is resistant against to “ENHANCED BASIC” level attack potential attackers.
2.9 Evaluator Comments / Recommendations
Several important aspects that could influence the use of the product, taking into account the scope
of the findings of the evaluation and its security target are listed;
• The TOE usage is NOT recommended given that there are exploitable vulnerabilities in the
operational environment.
• The physical access to the location where the TOE is deployed must be deeply controlled to
ensure that only authorized personnel have access rights.
3 SECURITY TARGET
The ST associated with this Certification Report is identified by the fallowing nomenclature:
Title : Kermen Portable v1.0 Security Target
Version : 1.7
Date : 29.08.2013
4 GLOSSARY
CB: Certification Body (TSE)
CC: Common Criteria
CCTL: Common Criteria Test Laboratory (TÃœBÄ°TAK BILGEM OKTEM)
CCCS: Common Criteria Certification Scheme (Turkish CC Scheme)
CCMB: Common Criteria Management Board
CCRA: Common Criteria Recognition Arrangement
CMS: Cryptographic Message Syntax
EAL: Evaluation Assurance Level
ETR: CCTL Kermen Portable ETR (03.09.2013)
15
SOFTWARE TEST and CERTIFICATION DEPARTMENT
COMMON CRITERIA CERTIFICATION SCHEME
CERTIFICATION REPORT
Date of Issue: 22/07/2013 Page : 15 / 15
Rev. No : 00
Date of Rev:
Document No: STCD-01-01-FR-01
IT: Information Technology
RFC: Request for comments
STCD: Software Test and Certification department (of TSE)
ST: Security Target (Kermen Portable v1.0 Security Target v1.7)
TOE: Target of Evaluation (Kermen Portable v1.0)
TSE: Turkish Standards Institution
TSFI: TOE Security Functionality Interface
UEKAE: National Research Institude of Electronics and Cryptology of Turkey
5 BIBLIOGRAPHY
[1] Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and
General Model; CCMB-2012-09-001, Version 3.1, Revision 4, September 2012
[2] Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional
Components; CCMB-2012-09-002, Version 3.1, Revision 4, September 2012
[3] Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance
Requirements; CCMB-2012-09-003, Version 3.1, Revision 4, September 2012
[4] Common Methodology for Information Technology Security Evaluation, Evaluation
Methodology; CCMB-2012-09-004, Version 3.1, Revision 4, September 2012
[5] YTBD-01-01-TL-01 CERTIFICATION REPORT PREPARATION INSTRUCTIONS, Version
1.0
6 ANNEXES
There is no additional information which is inappropriate for reference in other sections.