This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 1 Version: 1.3 Doc. ID: P002SP-001 Grade: Public Mxtran Payeeton Solution Security Policy Version : v 1.3 Effective Date : April 15, 2013 Classification : Public This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 2 Version: 1.3 Doc. ID: P002SP-001 Grade: Public EDITOR Author Title Anderson Ni Department Manager Tracy Huang Engineer Revision History Version Description Date By 0.1 Initial Version 2012/07/13 Tracy Huang 0.2 Modify some contents 2012/07/16 Anderson Ni 0.3 Modify some contents based on comments 2012/07/26 Tracy Huang, Anderson Ni 1.0 Final Version 2012/08/31 Anderson Ni 1.1 Modify according to CMVP’s comments 2013/01/11 Anderson Ni 1.2 Modify according to CMVP’s comments 2013/03/01 Anderson Ni 1.3 Modify according to CMVP’s comments 2013/04/15 Anderson Ni This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 3 Version: 1.3 Doc. ID: P002SP-001 Grade: Public Table of Contents 1 Introduction..................................................................................................................................5 1.1 Purpose..................................................................................................................................5 1.2 Scope......................................................................................................................................5 1.3 Security Level .......................................................................................................................5 2 Cryptographic Module Specification .........................................................................................7 2.1 Cryptographic Module Boundary......................................................................................7 2.2 Hardware ..............................................................................................................................9 2.3 Firmware.............................................................................................................................10 2.4 FIPS Approved Mode of Operation .................................................................................11 2.5 FIPS Approved Security Functions..................................................................................12 3 Cryptographic Module Ports and Interfaces...........................................................................13 3.1 Physical Ports .....................................................................................................................13 3.2 Logical Interfaces...............................................................................................................15 4 Roles, Services and Authentication ..........................................................................................16 4.1 Roles ....................................................................................................................................16 4.2 Identification and Authentication.....................................................................................17 4.3 Services................................................................................................................................19 5 Physical Security ........................................................................................................................23 5.1 Physical Security mechanisms as required by FIPS 140-2.............................................23 5.2 Additional Hardware Security Mechanisms ...................................................................24 6 Operational Environment .........................................................................................................25 7 Cryptographic Key Management .............................................................................................26 7.1 Critical Security Parameters and Public Keys................................................................26 7.2 Key Generation...................................................................................................................27 7.3 Key Entry and Output.......................................................................................................27 7.4 Key Storage.........................................................................................................................27 7.5 Key Zeroization ..................................................................................................................28 7.6 RNG Seed Values ...............................................................................................................28 8 Electromagnetic Interference/Compatibility (EMI/EMC).....................................................29 9 Self-Tests.....................................................................................................................................30 9.1 Power-up Self-Tests ...........................................................................................................30 This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 4 Version: 1.3 Doc. ID: P002SP-001 Grade: Public 9.2 Conditional Self-Tests........................................................................................................32 10 Design Assurance .......................................................................................................................33 10.1 Configuration Management..............................................................................................33 10.2 Delivery and Operation .....................................................................................................33 10.3 Guidance Documents .........................................................................................................33 11 Mitigation of Other Attacks......................................................................................................34 12 Security Rules.............................................................................................................................36 12.1 General Security Rules ......................................................................................................36 12.2 Identification and Authentication Security Rules...........................................................36 12.3 Access Control Security Rules ..........................................................................................37 12.4 Physical Security Rules......................................................................................................39 12.5 Mitigation of Other Attacks Security Rules ....................................................................39 13 Security Policy Check List Tables ............................................................................................40 13.1 Roles and required Identification and Authentication...................................................40 13.2 Strength of Authentication Mechanisms..........................................................................40 13.3 Services Authorized for Roles...........................................................................................41 13.4 Mitigation of Other Attacks..............................................................................................41 14 References ...................................................................................................................................42 15 Acronyms and Definitions.........................................................................................................43 This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 5 Version: 1.3 Doc. ID: P002SP-001 Grade: Public 1 Introduction 1.1 Purpose This is a non-proprietary security policy for the Mxtran Payeeton Solution (MPS, hereafter referred to as the module) of Mxtran Inc. This Security Policy describes how the cryptographic module meets the requirements for a FIPS 140-2 Security Level 3 validation as specified in the FIPS 140-2 standard. This Security Policy is part of the evidence documentation package to be submitted to the validation lab. FIPS 140-2 specifies the security requirements for a cryptographic module protecting sensitive information. Based on four security levels for cryptographic modules this standard identifies requirements in eleven sections. For more information about the standard, please visit http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf 1.2 Scope This Security Policy specifies the security rules under which the cryptographic module operates its major properties. It does not describe the requirements for the entire system, which makes use of the cryptographic module. 1.3 Security Level The module meets the overall requirements applicable to FIPS140-2 Security Level 3. In the individual requirement sections of FIPS 140-2 the following Security Level ratings are achieved: Section Section Title Level 1 Cryptographic Module Specification 3 2 Cryptographic Module Ports and Interfaces 3 3 Roles, Services, and Authentication 3 This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 6 Version: 1.3 Doc. ID: P002SP-001 Grade: Public Section Section Title Level 4 Finite State Model 3 5 Physical Security 3 6 Operational Environment N/A 7 Cryptographic Key Management 3 8 EMI/EMC 3 9 Self-tests 3 10 Design Assurance 3 11 Mitigation of Other Attacks 3 Table 1 – Security Level per FIPS 140-2 Section This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 7 Version: 1.3 Doc. ID: P002SP-001 Grade: Public 2 Cryptographic Module Specification The cryptographic module acts as a flexible platform for diversified mobile commerce services, allowing Mxtran clients to support both proximity payment and mobile payment via SMS for prepaid, online paid and post-paid services including e-ticketing, e-coupons, access control, membership management and more. Mxtran leverages extensive integrated circuit expertise to deliver highly customizable, portable applications and payment services in a single handset. The module is a single-chip module based on MX12E320128E controller by Mxtran. The MX12E320128E is a dual interface smart card controller that being designed for multiple applications. This module combines contact and contactless smart card technology on a single chip. 2.1 Cryptographic Module Boundary The cryptographic module boundary is the edge of the controller coated with opaque epoxy resin. The module will be embedded into a plastic film body and connected to two [7816-1] compliant contact plates and/or to an [14443] compliant external antenna loop. The boundary separates the module from the plastic film body, contact plates, and external antenna loop. The module is a single-chip implementation of a cryptographic module. During the manufacturing process, the epoxy-covered controller is wire-bonded into plastic film body with contact plates on both sides and/or an external antenna loop. The perimeter of the module forms the cryptographic boundary of this FIPS140-2 Security Level 3 compliant single-chip cryptographic module. The module block diagram and logical boundary are shown as following. This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 8 Version: 1.3 Doc. ID: P002SP-001 Grade: Public Voltage Regulator 32KB OTP ROM 128KB EEPROM 7.5KB AUX-RAM 256 SRAM 16 bit Timer WDT Interrupt Controller Memory Protect Unit POR Turbo 8051 MCU Address/Data Bus PKI Co-Processor AES TDES AC1 Int. OSC Reset/Clock Management VCC GND RST Security Circuit SHA-1 SHA-256 True Random Number Generator 288KB Flash ROM SWP SW-IO ISO 14443 Port Control RF Front-End AC2 USB Interface USB Controller D+ D- GPIO IO2 ISO 7816 Port Control*3 CLK IO IO1 IO3 IO4 IO5 Figure 1 – Cryptographic Module Block Diagram APDU PKI TRNG TDES SHA AES Hardware Module Hardware Driver Payeeton Card Manager Atomic Service APDU Dispatcher DRNG TDES AES RSA SHA HMAC ECDSA 7816(ICC/IFD) SWP 14443 Multi IO Middleware & Card OS Cryptographic Module Logical Boundary Applications FILM 2G/3G GATInterpreter Authentication Service File System Codec Service USB Figure 2 – Cryptographic Module Logical Boundary This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 9 Version: 1.3 Doc. ID: P002SP-001 Grade: Public 2.2 Hardware The boundary of the single-chip module is the edges and surfaces of the integrated circuit die which contains a CPU, OTPROM, Flash ROM, EEPROM and RAM. No components are excluded from the cryptographic boundary. The module is designed to be encased into different form factors such as a plastic SIM card, a SIM card with antenna, or any other support to produce the MX12E320128E controller, on which FIPS 140-2 Security Level 3 validated applications may be loaded and instantiated at post issuance. The following figures show two various form factors available from the module. Red perimeter indicates the cryptographic module boundary. Figure 3 – Contact Mode Figure 4 – Contactless Mode (Top view and bottom view) (Top view and bottom view) The cryptographic module is based on the MX12E320128E controller. This module comprises the following components:  CPU core  OTPROM as program memory  Flash ROM as data/program memory  EEPROM as data/program/secure data memory  Internal SRAM  Auxiliary SRAM (including RSA dedicated SRAM)  Dual data pointer This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 10 Version: 1.3 Doc. ID: P002SP-001 Grade: Public  Interrupt controller  Six 16-bit Timers with ETU clock sources  Watch Dog Timer with two clock sources (CLK and internal clock/16)  True Random number generator (TRNG)  Triple-DES accelerator  AES accelerator  SHA-1 & SHA-256 hardware module  Single-Wire Protocol (SWP) (Slave mode)  USB 2.0 Full-speed (Device mode)  PKI coprocessors with DMA function  RSA with randomly modulus (32 bits per step configurable)  Mathematical Library to support ECDSA (P-curve)  Two [7816] compliant electrical interfaces and response T=0 and T=1 protocol  Contactless RF interface according to [14443]  13.56 MHz operating frequency  847 kHz subcarrier for load modulation  CRC engine compliant to ISO/IEC 13239 2.3 Firmware The module contains platform firmware that resides in ROM, with key storage and future application storage functionality in the EEPROM. This firmware is implemented using high level language (C Language). It is loaded onto the module during manufacturing and does not allow for modification. An Error Detection Code (EDC) is calculated over the firmware during this installation and is checked at each power up. After completion of the manufacturing process (including pre-personalization), only trusted FIPS 140-2 validated applications shall be loaded or installed onto the module. Furthermore, at the time of loading, these applications must be identified as part of the cryptographic module. The module uses This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 11 Version: 1.3 Doc. ID: P002SP-001 Grade: Public HMAC to authenticate prior validated applications and avoid the loading of any unauthorized applications. Applications are isolated from each other due to the fact that the platform firmware does not contain any constructs that allow cross-application communication directly; any such communication must go by way of systems software mechanisms, which allow for implementation of strict security measures. Applications can only perform callable Approved security functions. The platform firmware restricts direct access to CSP through APDU ([7816-3] or/and [7816-4] compatible communication interface) and other hardware resources for a single user application. The FIPS 140-2 validation testing targeted this specific configuration. Changes to that configuration (for example, loading another application), would constitute a new module, and the new configuration would need to undergo 140-2 testing for FIPS 140-2 compliance. There is no assurance of operation unless the modified module has been validated to FIPS 140-2, per CMVP requirements. The firmware version supported by the module described in this security policy is: Simker 3.20. The firmware comprises the following components:  Authentication (AuthenServ): FileSystem, Atomic  Crypto (CodeServ): AES, RSA, SHA, TDES, HMAC, DRNG, ECDSA  Multiple IO (Multi_IO): ISO7816, ISO14443  APDU (Dispatcher): APDU bypass, Logical channel, multi-selectable applet management  Interpreter(Interpreter): CAT Applet interpreter 2.4 FIPS Approved Mode of Operation The module shall not contain a non-FIPS Approved mode of operation. Hence, as configured during production process, the module only operates in a FIPS Approved mode of operation, comprising all services described in section below. The module does not implement bypass or maintenance modes. The module will enter FIPS Approved mode following on a successful response to the initial authentication sequence handshake command. Successful transition to the FIPS Approved mode is indicated by an ATR and a Success response to the initial authentication sequence handshake This document may be freely reproduced and distributed in its original entirety without revision. Mxtran Payeeton Solution Security Policy Page: 12 Version: 1.3 Doc. ID: P002SP-001 Grade: Public command. The ATR value returned by the module during power-up serves as an Approved mode indicator. The ATR returned by the module is: ATR: 3B 99 94 80 1F C3 80 31 A0 73 BE 06 27 E0 FF B3 2.5 FIPS Approved Security Functions The following table gives the list of FIPS Approved security functions that are provided by the module. Security Function Details CAVP Cert. # AES ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); #1691 ECDSA FIPS186-3: PKG: CURVES( P-192 P-224 Testing Candidates ) SigGen: CURVES( P-192: (SHA-1, 256) P-224 (SHA-1, 256) ) SigVer: CURVES( P-192: (SHA-1, 256) P-224 (SHA-1, 256) ) #340 HMAC HMAC-SHA1 (KS