background image
IDeal Citiz v2.0 Open
FIPS 140-2 Security Policy
Ref.: 2013_1000002026-02
Page 6/33
2 INTRODUCTION
2.1
SCOPE
This document presents the security policy of the IDeal Citiz v2.0 Open cryptographic module for overall FIPS 140-2
level 3 validation.
The "Infraestructura Chaves Públicas Brasiliera - ICP-Brasil, Public Key Infrastructure" is based on FIPS 140-2, this
document also aswers to the validation of the PKI of the Instituto Nacianoal de Tecnologia da Informação (ITI) of
Brazil without any additional information.
2.2
PRODUCT DESCRIPTION
The IDeal Citiz v2.0 Open cryptographic module is a contact/contactless JavaCard multi-applications product in a
single Integrated Circuit Chip specifically designed for the security of data.
Customers, as government and enterprise, may download applications in card for identification, health or banking
markets.
Java technology is the leading multiple applications operating system for smart cards. It offers developers a
convenient platform on which to develop and implement smart card applets. The IDeal Citiz v2.0 Open module has
been designed to offer a modular and open solution based on reliable and standardized technologies. To that end, the
IDeal Citiz v2.0 Open module contains an implementation of the Sun Java Card TM 3.0.2 Classic Edition [JCS]
specifications. It allows implementing multiple applications associated with a high security level to execute the
applications by providing context independence between each of them. The IDeal Citiz v2.0 Open module is also
compliant with the GlobalPlatform Card Specification - Version 2.1.1 [GP] with SCP03 as defined in the
Amendment D [GP_AMD_D], where it secures the application management and manages the card life cycle.
2.3
SECURITY LEVELS
The IDeal Citiz v2.0 Open module respects the following Security Levels of the Security Requirements:
Security Requirements
Security Levels
Cryptographic Module Specification
3
Cryptographic Module Ports and Interfaces
3
Roles, Services, and Authentication
3
Finite State Model
3
Physical Security
3
Operation Environment
N/A
Cryptographic Key Management
3
EMI/EMC
3
Self-tests
3
Design Assurance
3
Mitigation of the Other Attacks
3
Tab 1: Security Level of Security Requirements