DOCUMENT ST
LEVEL Confidential
V1.5-22/4/2022
Security Target of Argrace
IoT Security Communication
Module (BLE + Wi-Fi) V2.0A-009
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021
REVISION HISTORY
Version Date Modification Author
1.0 June 15, 2021 First edition released
Eason Chan
Zhuoqian Liang
1.1 June 29, 2021
Preliminarily defined the scope of
TOE, Security problem, Security
objectives and Security Functional
Requirements
Eason Chan
Zhuoqian Liang
1.2 July 13, 2021
Update the hardware description,
software description, and security
functions description of the TOE
Eason Chan
Zhuoqian Liang
1.3 July 28, 2021
Update Security Functions, TOE
Scope, Security Objectives, Security
Functional Requirement, Summary
Eason Chan
Zhuoqian Liang
1.4 January 28, 2022
Update SFR for TOE
Modify according to EOR
Zhuoqian Liang
1.5 April 22, 2022
Modify according to feedback from
TACSL
Zhuoqian Liang
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021
CONTENTS
REVISION HISTORY......................................................................................................................1
CONTENTS..................................................................................................................................... II
1 ST Introduction .........................................................................................................................5
1.1 ST Reference.............................................................................................................5
1.2 TOE Reference..........................................................................................................5
1.3 TOE Overview ..........................................................................................................5
1.3.1 Usage and Major Security Functions of the TOE..............................................5
1.3.2 TOE Type..........................................................................................................6
1.3.3 Required non-TOE Hardware/Software/Firmware ...........................................6
1.4 TOE Description .......................................................................................................6
1.4.1 Physical Scope of the TOE................................................................................7
1.4.1.1 TOE Hardware Description.......................................................................8
1.4.1.2 TOE Dedicated Software...........................................................................8
1.4.1.3 Documentation ..........................................................................................9
1.4.2 Logical Scope of the TOE.................................................................................9
1.4.3 Life Cycle Description ......................................................................................9
2 Conformance Claim ................................................................................................................11
2.1 CC Conformance Claim..........................................................................................11
2.2 Package Claim.........................................................................................................11
2.3 PP Claim..................................................................................................................12
2.4 Conformance Claim Rationale................................................................................12
3 Security Problem Definition ...................................................................................................13
3.1 Assets:.....................................................................................................................13
3.2 Threats.....................................................................................................................14
3.3 Organizational Security Policies .............................................................................15
3.4 Assumptions............................................................................................................16
4 Security Objectives .................................................................................................................17
4.1 Security Objectives for the TOE .............................................................................17
4.2 Security Objectives for the Operational Environment ............................................18
4.3 Security Objectives Rationale .................................................................................19
4.3.1 Justification of Security Objectives.................................................................19
5 Extended Components Definition...........................................................................................21
5.1 Definition of the component cryptographic key management (FCS_CKM.5)........21
6 Security Functional Requirements ..........................................................................................22
6.1 Security Functional Requirement for the TOE........................................................22
6.2 TOE Security Assurance Requirement....................................................................27
6.3 Security Requirement Rationale..............................................................................28
6.3.1 Rationale for the security functional requirements .........................................28
6.3.2 Dependencies of security functional requirements..........................................30
6.3.3 Rationale for the Assurance Requirements......................................................31
7 TOE Summary Specification ..................................................................................................32
7.1 Security Functional Requirements and Fulfillment.................................................32
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021
7.1.1 Cryptographic support (TSF_CST).................................................................32
7.1.2 User data protection (TSF_UDP)....................................................................32
7.1.3 Secure firmware update (TSF_SFU)...............................................................33
7.1.4 Trusted path (TSF_TPH).................................................................................33
7.1.5 Memory protection (TSF_MPN).....................................................................34
7.2 Mapping of SFR and TSF .......................................................................................34
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021
This page is intentionally left blank
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 5
1 ST Introduction
1.1 ST Reference
Table 1-1 ST reference
Item Description
Document Title: Security Target of Argrace IoT Secure Communication Module(BLE + Wi-Fi)
Version: 1.5
Release date: April 22, 2022
Author: Zhuoqian Liang, Eason Chan
1.2 TOE Reference
Table 1-2 TOE reference
Item Description
Name: Argrace IoT Secure Communication Module(BLE + Wi-Fi)
Version: 2.0A-009
Release Date December 10, 2021
1.3 TOE Overview
1.3.1 Usage and Major Security Functions of the TOE
The TOE is used for providing security assurance for IoT host devices and IoT users, including
functions such as identity authentication, information encryption and decryption, confidential
information management, and access control.
Major security functions are listed in the following and all these functions need to be evaluated:
Table 1-3 Major security functions of the TOE
Security Function Description
Cryptographic support
(TSF_CST)
Cryptographic function:
➢ Cryptographic key derivation: derive 16-byte AES key
with MD5 algorithm.
➢ Encryption & Decryption: encrypt and decrypt data
with AES/CBC/PKCS5Padding and
AES/ECB/ZeroPadding cryptographic algorithms.
User data protection Restrictions of network connection:
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 6
(TSF_UDP) ➢ Cloud address restriction.
➢ APP connection restriction by application connection
control policy.
Secure firmware update
(TSF_SFU)
MD5 verification of firmware image.
Trusted path
(TSF_TPH)
Trusted communication path between TOE and APP and
cloud
➢ TOE establishes trusted data transfer path between itself
and APP.
➢ TOE initiates TLS communication between itself and
cloud.
Memory protection
(TSF_MPN)
Flash data encryption.
1.3.2 TOE Type
The TOE type in this ST is a security communication module which is used in IoT devices.
1.3.3 Required non-TOE Hardware/Software/Firmware
Required non-TOE hardware: CPU
Required non-TOE firmware: IC Dedicated Software (ICDS)
Required non-TOE application: IoT Cloud, Mobile App
The normal operation of TOE needs to include the above three components: non-TOE hardware,
non-TOE firmware and non-TOE system. The CPU, ICDS and TOE together constitute the IoT host
device. The device can support the use of functions by connecting with the App and the cloud.
1.4 TOE Description
The Target of Evaluation (TOE) in this ST is an IoT Security Communications Module (SCM),
which consists of TOE dedicated software and TOE hardware. Generally, the IoT SCM is integrated
into an IoT host device. This SCM is to enable the IoT host device connection to network, establish
secure communication network channel between the IoT device and other terminals (i.e. Cloud,
Mobile APP.), encrypt the user data for the IoT Application of IoT device, and store the encryption
data. The software of above features is called IoT Security Communication Embedded Software
(IoT SCES).
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 7
Figure 1-1 TOE (the green part) in the IoT device context
1.4.1 Physical Scope of the TOE
As shown in the following Table 1-4, the physical scope of the TOE consists of Hardware,
Software and Documentation. For the hardware part, TOE includes the main components except
CPU. The software part of TOE is called TOE dedicated software, which is mainly includes IoT
Security Communication Embedded Software (IoT SCES) and except the IC dedicated software
(ICDS). In addition, the Documentation called Argrace IoT Security Communication Module User
Manual, is also in the scope of TOE, which provides user’s guidance of TOE.
Table 1-4 Components of the TOE
Type Name Release Date
Form of
delivery
Method of
delivery
Hardware
Argrace IoT Secure
Communications Module
(Argrace IoT SCM)
June 3, 2021
Physical
Module
Post
Software
IoT Security
Communication
Embedded Software (IoT
SCES)
December 10,
2021
Embedded
Software,
*.bin
Post
Documentation
Argrace IoT Security
Communication Module
Users’ Manual
March 28, 2022
Electrical
Document,
*.pdf
Email
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 8
Figure 1-2 TOE Physical Scope (The green part)
1.4.1.1 TOE Hardware Description
In this ST, TOE hardware is an IoT SCM, which is composed of I/O ports, physical memories
(Flash and ROM), antenna connector and crystal oscillator. It provides the hardware functions
required for operation of IoT dedicated software. In particular, the CPU that developed and provided
by the third-party manufacturer is not in the scope of TOE hardware, which provides the security
function of generating true random number.
1.4.1.2 TOE Dedicated Software
The TOE dedicated software in this ST operating on IoT SCM is called IoT Secure
Communication Embedded Software (IoT SCES), which to implement the IoT device connection
to network, establish secure communication network channel between the IoT device and other
terminals (i.e., Cloud, mobile APP), encrypt and decrypt the data stored in Flash, and verify the
firmware update image.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 9
The IoT SCES is embedded in the IoT SCM, which is the operational environment of the IoT
SCES. However, due to different requirements and certification, other than IoT SCES, the other
embedded software (embedded software to fulfill IoT host device functions, non-security related)
in IoT SCM should be excluded and is not part of the TOE scope.
The IoT Secure Communication Embedded Software comprises:
- IoT Secure Communication Embedded Software source code, which is stored in Flash.
- User data of the Composite TOE, especially personalization data and other data generated
and used by the IoT Secure Communication Embedded Software, which is stored in Flash.
1.4.1.3 Documentation
The “Argrace IoT Security Communication Module Users’Manual V1.0” is also part of the TOE
which contains necessary description and guidance for users. In addition, the “Users’ Manual” also
includes guidance and requirements focused on security aspects.
1.4.2 Logical Scope of the TOE
The logical scope of TOE is the security functions as follows:
1 Cryptographic support (TSF_CST):
The TOE can derive 128-bit AES keys from true random number generated by CPU using MD5
algorithm. The TOE supports 128-bit AES CBC mode encryption and decryption function.
2 User data protection (TSF_UDP):
The TOE can only connect to cloud with approved IP address. The TOE can only connect to
mobile APP with mutually known initial key.
3 Secure firmware update (TSF_SFU):
The TOE verifies the MD5 value of firmware image. The approved MD5 values are delivered
to TOE via trusted path from cloud.
4 Trusted path (TSF_TPH):
The TOE will establish secure communication channel with mobile APP via self-defined
mechanism. All the data transferred is protected by 128-bit AES algorithm. The TOE will initiate
TLS channel with cloud.
5 Memory protection (TSF_MPN):
The TOE will encrypt all the data stored in Flash by 128-bit AES algorithm.
1.4.3 Life Cycle Description
The life-cycle of the IoT SCM TOE includes the following phases:
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 10
1. Development of hardware and firmware of IoT SCM
2. Production of hardware and firmware IoT SCM
3. Delivery of completed IoT SCM to IoT device manufacturer.
4. Integration of IoT SCM into IoT host device
5. Delivery of IoT device to IoT device user
6. Normal operation by IoT device user and IoT admin
Phases 1 to 3 will be responsible by the IoT SCM developer. It shall be ensured that these phases
are performed by trusted personnel in secure environments. Since the realization of the phases
depend on the concrete SCM, it is important that the IoT SCM developer considers and enforces
appropriate security measures during phases 1 to 3.
In phase 3, the certified IoT SCM has to be completed and no more modification of the
configuration is allowed, except the firmware update of security application.
Phases 4 and 5 will be responsible by the IoT device manufacturer. The IoT device manufacturer
shall regard the assumptions as stated in Section 3.4 hereinafter (as far as these assumptions are
applicable, according to the concrete form factor of the IoT SCM and the way of integration into the
IoT host device).
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 11
2 Conformance Claim
This chapter is divided into the following sections:
â—¼ CC Conformance Claim;
â—¼ Package Claim;
â—¼ PP Claim;
â—¼ Conformance Claim Rationale.
2.1 CC Conformance Claim
This Security Target and TOE claim to be conformant to the Common Criteria version 3.1,
Revision 5.
Furthermore, they claim to be CC Part 2 conformant/extended and CC Part 3
conformant/extended.
This Security Target and TOE have been built with the Common Criteria for Information
Technology Security Evaluation Version 3.1 which comprises:
â—¼ Common Criteria for Information Technology Security Evaluation Part 1: Introduction and
general model, Version 3.1, Revision 5, April 2017.
â—¼ Common Criteria for Information Technology Security Evaluation Part 2: Security Functional
Components, Version 3.1, Revision 5, April 2017 (extended conformance with list of extended
components defined in chapter 5).
â—¼ Common Criteria for Information Technology Security Evaluation Part 3: Security assurance
components, Version 3.1, Revision 5, April 2017 (extended conformance with list of extended
components defined in chapter 5).
â—¼ Common Methodology for Information Technology Security Evaluation (CEM), Version 3.1,
Revision 5, April 2017.
2.2 Package Claim
The assurance level for this Security Target is EAL 2 augmented with:
â—¼ ALC_FLR.1
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 12
2.3 PP Claim
This Security Target does not claim conformance to Protection Profile.
2.4 Conformance Claim Rationale
No conformance claims rationale is necessary as this ST does not claim conformance to
Protection Profile.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 13
3 Security Problem Definition
This chapter contains the following sections:
â—¼ Assets
â—¼ Threats
â—¼ Organizational Security Policies
â—¼ Assumptions
3.1 Assets:
List of TOE assets here.
Asset Description Protection needs
IoT device
data
Any data sent from the IoT device to the IoT cloud / IoT device
admin.
IoT device data may be produced by the IoT application, and/or
IoT SCM. IoT device data includes device status data, response
data of control, consumption information, billing information,
etc. (can’t provide the full list data type because it depends on the
concrete use case of the IoT device).
Integrity/
authenticity,
confidentiality
External data
Any data received by the IoT device, originating from external
network terminals, which the IoT device has established a
network connection to.
External data may be originated from the external network
terminals (i.e., IoT cloud, mobile App, IoT devices etc.), or may
be just forwarded by the external network device (e.g., IoT admin
data, which are received by the IoT device through an IoT
gateway).
External data does not refer to any specific kind of data, but the
data via an established security network connection with trusted
terminals, and has been fully tested during phase1-4 life-cycle of
the IoT SCM.
Integrity/
authenticity,
confidentiality
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 14
IoT Platform
Registration
Key
Each IoT device has unique registration key in IoT Platform,
which contains “Product Key”, “Device Name”, and “Device
Secret”/ “Device credentials”. When SCM establishes
communication channel with IoT cloud for the IoT device, the
cloud will verify the IoT device’s registration key.
Integrity/
authenticity
confidentiality
resistance
against timing
analysis
SCM FW
IoT Secure Communication Embedded Software running on the
TOE hardware
Integrity/
authenticity,
confidentiality
SCM FW
update version
Attribute of the SCM FW update image specifying its version.
The version will be updated into SCM when the new SCM FW
image completes update.
Integrity/
authenticity
3.2 Threats
T.SCM: Modification
The attacker may attempt to intercept the information received and sent between IoT devices
that the IoT SCM TOE is integrated in during the communication between IoT SCM TOE and
external terminals. Furthermore, the attacker may attempt to modify, integrate, and replay the data
in various ways without being discovered by IoT SCM TOE and external terminals.
As a result, the IoT device obtains or receives wrong information.
T.SCM: Disclosure
The attacker may attempt to intercept the information received and sent between the IoT
devices and external terminals through direct or indirect means, and gain knowledge about
transmitted IoT device data or external device data.
As a result, the attacker has access to data sent or received by the IoT device the TOE is
integrated in and retrieves confidential assets from that data.
T.SCM: Impersonation
The attacker may attempt to send information to the IoT device that the IoT SCM TOE is
integrated in, impersonating one of the external terminals, or to send information to one of the
external terminals, impersonating the IoT SCM TOE, without the respective receiving party being
able to detect that
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 15
The attacker can complete the attack without access to the device, and is not discovered by the
IoT SCM TOE.
As a result, the IoT device that the IoT SCM TOE is integrated in, or the IoT device users may
receive malicious order or information.
T.SCM: IllegalConnection
A faulty or maliciously modified IoT application may try to establish a network connection to
external network devices/addresses, which are not related to the operation of the IoT device,
possibly ending up in confidential data being sent to the wrong entity in the network. Furthermore,
a faulty or maliciously modified IoT application may try to establish a network connection to
external network devices/addresses without establishing a secure communication channel, possibly
ending up in confidential data being disclosed during transit or data being modified, substituted or
replayed without the receiving party being able to detect that.
T.SCM: PhysicalProb
The attacker may attempt to physically disassemble and connect to the TOE to access, obtain
user data and cryptographic key data.
As a result, the attacker has access to data and crack the ciphertext sent and received by the IoT
device the TOE is integrated in.
3.3 Organizational Security Policies
P.SCM: FirmwareUpdate
The TOE should provide functionality to securely update its firmware, protected concerning
authenticity and confidentiality. Only authentic SCM firmware update images as provided by the
developer of the TOE shall be accepted by the TOE. Non-authentic SCM firmware update images
or those being issued by the TOE developer but modified thereafter shall be rejected by the TOE.
The TOE shall not accept a SCM firmware update image, if its firmware version is older than the
version of the latest successfully installed firmware.
P.SCM: RNG
The TOE should use and rely on the trusted true random number source to get true random
numbers. Such random number source can be a separate random generator or a CPU providing true
random number generation function.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 16
3.4 Assumptions
A.SCM: IoTManufacturer
It is assumed that the IoT device manufacturer understands which expected IoT host devices
can be physically bound and integrated with the IoT SCM TOE, and this operation is not easy to
implement. In addition, IoT device manufacturers can detect whether the device has been physically
modified.
A.SCM: IoTApplication
It is assumed that the security requirements of the IOT application are consistent with the
security functions provided by the IoT SCM TOE, and the IoT application uses the security functions
provided by the IoT SCM TOE to protect the information received or sent, and to ensure that the
data is sent to the expected device or from the expected device receiving data
A.SCM: Communication
It is assumed that IoT device manufacturers only use IoT SCM TOE as the only way for IoT
host devices to communicate with external network devices, that is, IoT devices do not use other
methods to communicate with external devices.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 17
4 Security Objectives
This chapter describes the security objectives for the TOE and the Security Objectives for the
TOE environment. The security objectives for the TOE environment are separated into security
objectives for the development and production environment and security objectives for the
operational environment.
The following are the Parts of this chapter.
â—¼ Security Objectives for the TOE;
â—¼ Security Objectives for the Operational Environment;
â—¼ Security Objectives Rationale.
4.1 Security Objectives for the TOE
The following Table lists the Security Objectives of this Security Target regarding the TOE.
Table 4-1: Security objectives for the TOE
O.SCM: AuthorityProt Verify the authority of connected IoT external terminals.
O.SCM: ConfidentialProt Data encryption and decryption when the TOE communicates
with external terminals.
O.SCM: FirmwareUpdate Firmware update image verification
O.SCM: MemoryProt Data encryption for the data stored in the TOE memory
O.SCM: IllegalConnectionRest Secured communication for data transfer and restricts illegal
connections by specified connection address
O.SCM: AuthorityProt
Before the IoT SCM TOE communicates with IoT external terminals (i.e., Cloud, Mobile App),
the authority of the external terminals should be verified.
O.SCM: ConfidentialProt
The TOE provides functionality of data confidentiality protection by encryption of data sent to
an external network device, and by decryption of ciphertext data received from an external network
device. The encryption mechanism(s) used shall provide security level of at least 128-bit AES
algorithm.
O.SCM: FirmwareUpdate
The IoT SCM TOE provides functionality to securely update its firmware, protected
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 18
concerning authenticity and confidentiality. Only authentic SCM firmware update images as
provided by the developer of the TOE can be accepted by the TOE. Non-authentic SCM firmware
update images or those being issued by the TOE developer but modified thereafter should be rejected
by the TOE. The TOE should not accept a SCM firmware update image, if its firmware version is
older than the version of the latest successfully installed firmware.
O.SCM: MemoryProt
The user data stored in TOE memory are encrypted through 128-bit AES key derived from true
random number by AES algorithm.
O.SCM: IllegalConnectionRest
TOE establishes secured communication for data transfer between itself and external terminals.
TOE restricts illegal connections attempt from other external terminals.
4.2 Security Objectives for the Operational Environment
The following Table lists the Security Objectives of this Security Target regarding the
operational environment of the TOE:
Table 4-2: Security objectives for the operational environment
OE.SCM: IoTManufacturer Manufacturer should confirm IoT host device can be physically
integrated with the TOE correctly.
OE.SCM: IoTApplication IOT applications should use the security functions provided by
TOE and ensure the consistency of use.
OE.SCM: Communication TOE should be the only way for IoT host device to communicate
with external network devices.
OE.SCM: RNG The TOE shall relay on the trusted CPU to get random numbers.
OE.SCM: IoTManufacturer
The IoT device manufacturer should understand which expected IoT host devices can be
physically bound and integrated with the IoT SCM TOE, and this operation is not easy to implement.
In addition, IoT device manufacturers shall detect whether the device has been physically modified.
OE.SCM: IoTApplication
The security requirements of the IOT application should be consistent with the security
functions provided by the IoT SCM TOE, and the IoT application shall use the security functions
provided by the IoT SCM TOE to protect the information received or sent, and to ensure that the
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 19
data is sent to the expected device or from the expected device receiving data
OE.SCM: Communication
The IoT device manufacturers should only use IoT SCM TOE as the only way for IoT host
devices to communicate with external network devices, that is, IoT devices do not use other methods
to communicate with external devices.
OE.SCM: RNG
The TOE can use and rely on the IoT SCM CPU to generate true random numbers.
4.3 Security Objectives Rationale
The Table below gives an overview of how the assumptions, threats, and organizational
security policies are addressed by the objectives. The text following after the table justifies this in
detail.
Table 4-3: Security Objectives versus Assumptions, Threats or Policies
Assumption, Threat or Organizational Security Policy Security Objective
T.SCM: Modification O.SCM: AuthorityProt
T.SCM: Disclosure O.SCM: ConfidentialProt
T.SCM: Impersonation O.SCM: AuthorityProt
T.SCM: IllegalConnection O.SCM: IllegalConnectionRest
T.SCM: PhysicalProb O.SCM: MemoryProt
P.SCM: FirmwareUpdate O.SCM: FirmwareUpdate
P.SCM: RNG OE.SCM: RNG
A.SCM: IoTManufacturer OE.SCM: IoTManufacturer
A.SCM: IoTApplication OE.SCM: IoTApplication
A.SCM: Communication OE.SCM: Communication
4.3.1 Justification of Security Objectives
Justification for each threat, OSP, and assumption.
T.SCM: Modification is directly countered by O.SCM: AuthorityProt, which states that the IoT
SCM TOE shall complete the authority authentication with IoT external terminals and provide
protection.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 20
T.SCM: Disclosure is directly countered by O.SCM: ConfidentialProt, which states that the IoT
SCM TOE shall provide confidentiality protection of information exchanged between IoT devices
and external terminals.
T.SCM: Impersonation is directly countered by O.SCM: AuthorityProt, which states that the IoT
SCM TOE should complete the authority authentication with IoT external terminals and provide
protection.
T.SCM: IllegalConnection is directly countered by O.SCM: IllegalConnectionRest, which states
that the TOE should establishes secured communication for data transfer and restricts illegal
connections from external terminals.
T.SCM: PhysicalProb is directly countered by O.SCM: MemoryProt, which states that the TOE
should encrypt the data stored in the memory.
P.SCM: FirmwareUpdate is directly enforced by O.SCM: FirmwareUpdate, which states that
the TOE should verify the firmware update images.
P.SCM: RNG is directly enforced by OE.SCM: RNG, which states that the TOE should use trusted
CPU to generate random numbers.
A.SCM: IoTManufacturer is directly upheld by OE.SCM: IoTManufacturer (objective re-states
assumption).
A.SCM: IoTApplication is directly upheld by OE.SCM: IoTManufacturer (objective re-states
assumption).
A.SCM: Communication is directly upheld by OE.SCM: Communication (objective re-states
assumption).
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 21
5 Extended Components Definition
5.1 Definition of the component cryptographic key management
(FCS_CKM.5)
This component describes functional requirements for key derivation as process by which one
or more keys are calculated from either a pre-shared key or a shared secret and other information.
The component is part of the family FCS_CKM of the class FCS. The component FCS_CKM.5 has
been specified as follows:
Management: FCS_CKM.5
There are no management activities foreseen.
Audit: FCS_CKM.5
There are no actions defined to be auditable.
FCS_CKM.5 Cryptographic key derivation
Hierarchical to: No other components.
Dependencies: [FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.5.1 The TSF shall derive cryptographic keys [assignment: key type] from
[assignment: input parameters] in accordance with a specified cryptographic key derivation
algorithm [assignment: cryptographic key derivation algorithm] and specified cryptographic key
sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of
standards].
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 22
6 Security Functional Requirements
This chapter contains the following sections:
â—¼ Security Functional Requirement for the TOE
â—¼ Security Assurance Requirements for the TOE
â—¼ Security Requirements Rationale
This chapter describes the Security Functional Requirement of the ST, Operations such as the
Selection, Assignment and Refinement of the ST will be highlighted as following:
1) Assignment: bold and between brackets
2) Selection: italics and between brackets
3) Refinement: underlying
4) Iteration: SFR/Identifier, bold
6.1 Security Functional Requirement for the TOE
This chapter describes the security requirements for the TOE.
In order to define the Security Functional Requirements Part 2 of the Common Criteria was
used.
FCS_CKM.4: Cryptographic key destruction
Hierarchical to: No other components
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4.1: The TSF shall destroy cryptographic keys in accordance with a
specified cryptographic key destruction method [delete cryptographic
key instantly when complete session with the key] that meets the
following: [FIPS 197, NIST SP 800-38A].
FCS_CKM.5 Cryptographic key derivation
Hierarchical to: No other components.
Dependencies: [FCS_CKM.2 Cryptographic key distribution, or
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 23
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.5.1 The TSF shall derive cryptographic keys [AES key] from [Bluetooth
device name, Specific string, true random numbers] in accordance
with a specified cryptographic key derivation algorithm [MD5] and
specified cryptographic key sizes [128 bits] that meet the following:
[FIPS 197, NIST SP 800-38A].
Application Notes: Bluetooth device name is the name of the device where the TOE is integrated.
Specific string is a pre-defined string embedded in the source code of the TOE.
FCS_COP.1: Cryptographic operation
Hierarchical to: No other components
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1: The TSF shall perform [encryption, decryption] in accordance with a
specified cryptographic algorithm [AES/CBC mode/ PKCS5Padding,
AES/ECB mode/ZeroPadding] and cryptographic key sizes [128
bits] that meet the following: [FIPS 197, NIST SP 800-38A].
FDP_ACC.1/Cloud: Subset of access control
Hierarchical to: No other components
Dependencies: FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1: The TSF shall enforce the [network connection control policy] on
[Objects: cloud
Subjects: IoT SCM
Operations: establishing network connection]
FDP_ACF.1/Cloud: Security attribute based access control
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 24
Hierarchical to: No other components
Dependencies: FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute initialisation
FDP_ACF.1.1: The TSF shall enforce the [network connection control policy] to
objects based on the following: [objects: cloud; subjects: IoT SCM;
attributes: requested IP address of cloud, TLS certificate,
connection control rule (tuple of allowed IP address)]
FDP_ACF.1.2: The TSF shall enforce the following rules to determine if an operation
among controlled subjects and controlled objects is allowed: [network
connection control policy: Establishing network connection to a
cloud is allowed, if there is a connection control rule configured in
the TOE, whose allowed network address matches the requested
network address, and TLS handshake between TOE and cloud is
successful].
FDP_ACF.1.3: The TSF shall explicitly authorise access of subjects to objects based
on the following additional rules: [None].
FDP_ACF.1.4: The TSF shall explicitly deny access of subjects to objects based on the
following additional rules: [Establishing network connection to a
cloud is denied if the requested network address does not match
allowed network address].
FDP_ACC.1/APP: Subset of access control
Hierarchical to: No other components
Dependencies: FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1: The TSF shall enforce the [APP connection control policy] on
Objects: APPs
Subjects: IoT SCM
Operations: establishing APP connections
FDP_ACF.1/App: Security attribute based access control
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 25
Hierarchical to: No other components
Dependencies: FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute 25nitialization
FDP_ACF.1.1: The TSF shall enforce the [APP connection control policy] to objects
based on the following: [objects: APP; subjects: IoT SCM;
attributes: Bluetooth device name, Specific string, connection
control rule (Bluetooth device name + Specific string)].
FDP_ACF.1.2: The TSF shall enforce the following rules to determine if an operation
among controlled subjects and controlled objects is allowed: [APP
connection control policy: Establishing connection to a mobile APP
is allowed if encrypted information sent by TOE can be decrypted
by the mobile APP with initial key. The initial key is derived by
MD5 of Bluetooth device name and Specific string. Bluetooth
device name of TOE is public, and the Specific string is embedded
in mobile APP source code and the TOE firmware source code
during development and manufacturing phase].
FDP_ACF.1.3: The TSF shall explicitly authorise access of subjects to objects based
on the following additional rules: [None].
FDP_ACF.1.4: The TSF shall explicitly deny access of subjects to objects based on the
following additional rules: [None].
FDP_ACC.1/SCMFW: Subset of access control
Hierarchical to: No other components
Dependencies: FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1: The TSF shall enforce the [IoT firmware update policy] on
Objects: SCM firmware update image
Subjects: IoT SCM
Operations: SCM firmware update
FDP_ACF.1/SCMFW: Security attribute based access control
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 26
Hierarchical to: No other components
Dependencies: FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute initialisation
FDP_ACF.1.1: The TSF shall enforce the [IoT firmware update policy] to objects
based on the following: [objects: SCM firmware update image;
subjects: IoT SCM; attributes: MD5 of SCM firmware update
image, SCM firmware update version, latest SCM firmware
version].
FDP_ACF.1.2: The TSF shall enforce the following rules to determine if an operation
among controlled subjects and controlled objects is allowed: [IoT
firmware update policy: SCM firmware update is allowed, if the
MD5 of SCM firmware update image is successfully verified
against the corresponding SCM firmware update image and SCM
firmware update version presented in the SCM firmware update
request].
FDP_ACF.1.3: The TSF shall explicitly authorise access of subjects to objects based
on the following additional rules: [None].
FDP_ACF.1.4: The TSF shall explicitly deny access of subjects to objects based on the
following additional rules: [SCM firmware update is denied, if the
SCM firmware version presented in the SCM firmware update
request is older than the latest SCM firmware version].
FTP_ITC.1 Inter-TSF trusted channel
Hierarchical to: No other components.
Dependencies: No dependencies.
FTP_ITC.1.1 The TSF shall provide a communication channel between itself and
another trusted IT product that is logically distinct from other
communication channels and provides assured identification of its end
points and protection of the channel data from modification or
disclosure.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 27
FTP_ITC.1.2 The TSF shall permit [the TSF] to initiate communication via the trusted
channel.
FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for
[Firmware update, Router connection information transfer].
FPT_PHP.3 Resistance to physical attack
Hierarchical to: No other components.
Dependencies: No dependencies.
FPT_PHP.3.1 The TSF shall resist [Memory physical reading] to the [Flash] by
responding automatically such that the SFRs are always enforced.
6.2 TOE Security Assurance Requirement
The Security Target will be evaluated according to:
Security Target Evaluation (Class ASE)
The TOE Assurance Requirements for the Evaluation of the TOE and its development and
operating environment are those taken from the:
Evaluation Assurance Level 2 (EAL 2)
and augmented by the following components:
ALC_FLR.1
Table 5-1: Security Assurance Requirements
Assurance Class Assurance Family Assurance Level
Development
ADV_ARC.1 Security architecture
description
2
ADV_FSP.2 Security-enforcing
functional specification
2
ADV_TDS.1 Basic design 2
Guidance Documents
AGD_OPE.1 Operational user
guidance
2
AGD_PRE.1 Preparative procedures 2
Life Cycle Support
ALC_CMC.2 Use of a CM system 2
ALC_CMS.2 Parts of the TOE CM
coverage
2
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 28
ALC_DEL.1 Delivery procedures 2
ALC_FLR.1 Basic flaw remediation augmented
Security Target
Evaluation
ASE_CCL.1 Conformance claims 2
ASE_ECD.1 Extended components
definition
2
ASE_INT.1 ST introduction 2
ASE_OBJ.2 Security objectives 2
ASE_REQ.2 Derived security
requirements
2
ASE_SPD.1 Security problem
definition
2
ASE_TSS.1 TOE summary
specification
2
Tests
ATE_COV.1 Evidence of coverage 2
ATE_FUN.1 Functional testing 2
ATE_IND.2 Independent testing -
sample
2
Vulnerability
Assessment
AVA_VAN.2 Vulnerability analysis
(refined)
2
6.3 Security Requirement Rationale
6.3.1 Rationale for the security functional requirements
Table 5-2 below gives an overview on how the security functional requirements are combined
to meet the security objectives. The detailed justification follows after the table.
Table 5-2 Security Functional Requirements versus Security Objectives
Objective TOE Security Functional
Requirement
Justification
O.SCM:
AuthorityProt
FCS_CKM.5
Defines the elements required for the initial
key generation, algorithm and key sizes. And
the initial key is used to verify the authority of
connected mobile APP.
O.SCM:ConfidentialP
rot
FCS_CKM.4
Defines the cryptographic key destruction
method.
FCS_COP.1
Provides encryption and decryption function
and defines the cryptographic algorithm and
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 29
key sizes.
O.SCM:
FirmwareUpdate
FDP_ACC.1/SCMFW
Defines the requirement for a firmware update
policy and defines the corresponding objects,
which can be updated, and the update
operations.
FDP_ACF.1/SCMFW
Defines the requirement for security attribute
based access control for the update operations,
the corresponding security attributes and the
rules allowing only authentic images updated,
and preventing downgrading.
FTP_ITC.1
Establishes trusted channel for TOE to get
requested MD5 value of firmware update
image.
O.SCM: MemoryProt
FCS_COP.1
Provides encryption and decryption function
and defines the cryptographic algorithm and
key sizes.
FPT_PFP.3
Provides the function that resists memory
physical reading.
O.SCM:
IllegalConnectionRest
FTP_ITC.1
Establishes trusted channel between TOE and
external terminals.
FDP_ACC.1/Cloud
Defines the requirement for network
connection control policy and defines the
corresponding objects (cloud) operations
(connection establishment).
FDP_ACF.1/Cloud
Defines the requirement for security attribute
based access control for the connection
establishment, the corresponding security
attributes and the rules allowing only those
connections, which have been configure in
terms of connection control rules (security
attribute). Requested connections, whose
connection rules do not match the allowed, are
denied.
FDP_ACC.1/APP
Defines the requirement for APP connection
control policy and defines the corresponding
objects (mobile APP) operations (connection
establishment).
FDP_ACF.1/APP
Defines the requirement for security attribute
based access control for the connection
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 30
establishment, the corresponding security
attributes and the rules allowing only those
connections, which control the same initial key
for TOE and mobile APP.
6.3.2 Dependencies of security functional requirements
Table 5-3 below lists the security functional requirements defined in this security target, their
dependencies and whether they are satisfied by other security requirements defined in this security
target. The text following the table discusses the remaining cases.
Table 5-3: Dependencies of the Security Functional Requirements
Security Functional
Requirement
Dependencies Fulfilled by security requirements
FCS_CKM.4 FCS_CKM.1 or FDP_ITC.1
or FDP_ITC.2
No, but qualified by FCS_CKM.5
FCS_CKM.5
FCS_CKM.2 or FCS_COP.1
FCS_CKM.4
Yes, qualified by FCS_COP.1
Yes
FCS_COP.1
FDP_ITC.1 or FDP_ITC.2 or
FCS_CKM.1
FCS_CKM.4
No, but qualified by FCS_CKM.5
Yes
FDP_ACC.1/Cloud FDP_ACF.1 Yes
FDP_ACF.1/Cloud
FDP_ACC.1
FMT_MSA.3
Yes
No, not applicable as qualified by
FDP_ACF.1
FDP_ACC.1/APP FDP_ACF.1 Yes
FDP_ACF.1/APP
FDP_ACC.1
FMT_MSA.3
Yes
No, not applicable as qualified by
FDP_ACF.1
FDP_ACC.1/SCMFW FDP_ACF.1 Yes
FDP_ACF.1/SCMFW
FDP_ACC.1
FMT_MSA.3
Yes
No, not applicable as qualified by
FDP_ACF.1
FTP_ITC.1 /
FPT_PHP.3 /
As the above Table shows, all other dependencies of functional requirements are fulfilled by
security requirements defined in this Security Target.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 31
Note:
The dependency to FCS_CKM.1 is replaced by FCS_CKM.5. In this TOE, it does not directly
use the function of Cryptographic key generation but use key derived from random number.
The dependency to FMT_MSA.3 is not applicable. There are no default values for the attributes
of this access control policy as the controlled objects, i.e. the SCM firmware update image, cloud,
and mobile APP are not created under this access control policy.
6.3.3 Rationale for the Assurance Requirements
The assurance level EAL 2 and the augmentation with the requirements ALC_FLR.1 was
chosen in order to meet assurance expectations explained in the following paragraphs.
The primary use case for the IoT SCM is to be integrated in IoT host devices like smart home
appliances running in a household with no physical access by potential attackers. Furthermore, there
is an SFR that requires countermeasures against timing analyses. As finally the TOE has to be
resistant against network-based penetration attacks, the evaluation assurance level EAL2 including
vulnerability assessment component AVA_VAN.2 (refined) was chosen (providing assurance
concerning resistance of the TOE against attackers possessing basic attack potential and requiring
vulnerability analysis concerning all network services provided). The AVA_VAN.2 vulnerability
analysis has to regard all applicable publicly known vulnerabilities. For the TOE’s main security
needs, i.e. securely implemented network protocols and – if used – a securely implemented
underlying general-purpose operating system, those are readily available in form of comprehensive
public databases containing commonly known vulnerabilities. By the refinement of AVA_VAN.2,
the vulnerability analysis explicitly has to cover known vulnerabilities for all network services
provided by the TOE (and not only those related to its evaluated security functions), to make sure
that the IoT SCM cannot be compromised by any kind of known network attack. For security flaws
detected in the TOE once evaluated and certified, the TOE developer is expected to have basic flaw
remediation procedures in place, therefore ALC_FLR.1 is augmented. (As long as a flaw could be
remediated in firmware and no changes to the hardware of the TOE would be necessary, the TOE
developer would simply issue a corresponding firmware update for the TOE as part of their flaw
remediation procedure.)
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 32
7 TOE Summary Specification
TOE summary specification defines TOE security functions in line with known SFR,
technologies referring to security mechanism or implementing TOE security functions, and security
guarantee measures that meet known requirements of assurance.
7.1 Security Functional Requirements and Fulfillment
7.1.1 Cryptographic support (TSF_CST)
The TOE provides cryptographic support for data transfer and memory protection. For data
transferred between TOE and mobile APP, the TOE utilizes CPU to generate a true random number,
and then derives a 128-bit AES key from the random number via MD5 calculation to encrypts and
decrypts data transferred. For the data stored in Flash, the TOE derives a 128-bit AES key via MD5
calculation of Bluetooth device name and Specific string, and then encrypts and decrypts data stored
in Flash through this key.
In addition, the TOE will not store any derived keys. Every derived key will be deleted instantly
after completion of cryptographic operations via this key.
SFRs:
â—¼ FCS_CKM.5: Cryptographic key derivation
â—¼ FCS_CKM.4: Cryptographic key destruction
â—¼ FCS_COP.1: Cryptographic operation
7.1.2 User data protection (TSF_UDP)
The TOE mainly ensures the security of user data by establishing connection control policy.
For the connection between APP and TOE, the TOE enforces the rules based on key attributes,
including Bluetooth device name and Specific string.
The rule is that a mobile APP is allowed to connect with TOE if encrypted information sent by
TOE can be decrypted by the mobile APP with initial key. The initial key is derived by MD5
calculation of Bluetooth device name and Specific string. Bluetooth device name of TOE is public
(It can be found when searching for devices through APP), and the Specific string is embedded
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 33
in mobile APP source code and the TOE firmware source code during development and
manufacturing phase.
For the connection between Cloud and TOE, the TOE enforces the rules based on requested of
IP address, TLS certificate, connection control rule (tuple of allowed network address).
The rule is that a cloud is allowed to connect with TOE if there is a connection control rule
configured in the TOE, whose allowed network address matches the requested network address, and
TLS handshake between TOE and cloud is successful.
SFRs:
â—¼ FDP_ACC.1/Cloud: Subset of access control
â—¼ FDP_ACC.1/APP: Subset of access control
â—¼ FDP_ACF.1/Cloud: Security attribute based access control
â—¼ FDP_ACF.1/APP: Security attribute based access control
7.1.3 Secure firmware update (TSF_SFU)
The TOE establishes the trusted channel with IoT cloud via TLS protocol. This ensures that the
MD5 of requested firmware update image is delivered to the TOE securely.
The TOE will calculate the MD5 of received firmware update image and verify it with the
requested MD5. If matches, update is allowed, otherwise, it will be denied. The TOE also compares
version of the update firmware with the current firmware. If update firmware version is older than
current one, it will be denied.
SFRs:
â—¼ FTP_ITC.1: Inter-TSF trusted channel
â—¼ FDP_ACC.1/SCMFW: Subset of access control
â—¼ FDP_ACF.1/SCMFW: Security attribute based access control
7.1.4 Trusted path (TSF_TPH)
The TOE is mainly connected to external terminals in two ways. One is to connect with cloud
using HTTPS/TLS protocol for data transferring, especially secured firmware update. All
connection requests with cloud must be authenticated using token that TOE requests from cloud
according to TLS 1.2 protocol.
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 34
The other way is to connect with APP using self-defined secure path. After APP is successfully
connected to TOE according to APP connection control policy, the TOE will send generated true
random number encrypted by initial key to the APP. APP will decrypt the random number with its
initial key and using this random number to derive 128-bit AES key. After that, all the data
transferred between the TOE and APP will be encrypted by this 128-bit AES key during this session.
When the session is completed, the key will be deleted instantly.
SFRs:
â—¼ FTP_ITC.1: Inter-TSF trusted channel
7.1.5 Memory protection (TSF_MPN)
The data stored in the Flash, such as user data and firmware is encrypted. All the data will be
encrypted together before writing into the Flash. Therefore, all the data in the Flash is encrypted and
secure.
SFRs:
â—¼ FPT_PHP.3: Resistance to physical attack
7.2 Mapping of SFR and TSF
The below Table shows the mapping between SFR and supporting TSF:
Table 7-1 Mapping between SFR and TSF
SFR
TSF
TSF_CST
TSF_UDP
TSF_SFU
TSF_TPH
TSF_MPN
FCS_CKM.4 √
FCS_CKM.5 √
FCS_COP.1 √
All Rights Reserved, Copyright & Proprietary © Hangzhou Yaguan Technology 2021 35
FDP_ACC.1/Cloud √
FDP_ACF.1/Cloud √
FDP_ACC.1/APP √
FDP_ACF.1/APP √
FDP_ACC.1/SCMFW √
FDP_ACF.1/SCMFW √
FTP_ITC.1 √ √
FPT_PHP.3 √