Deutschland HSM for eID servers for the electronic ID card

Page created by Jennifer Matthews
 
CONTINUE READING
Deutschland HSM for eID servers for the electronic ID card
D

                                         electronic ID card
                                         ­ eutschland HSM
                                         for eID servers for the

             Secure Communications
          Application Brochure | 01.00

R&S®CryptoServer D
                 ­ eutschland HSM/3
Deutschland HSM for eID servers for the electronic ID card
Contents                                                 Public key ­infrastructures for the electronic
                                                         ID card........................................................................... 3
                                                         1.1     Country signing certificate authority
                                                                 (CSCA PKI)......................................................... 3
This document describes the settings required            1.2    Country verifying certificate authority –
on the R&S®CryptoServer ­Deutschland HSM/3                      ­electronic identity PKI (CVCA‑eID PKI).............. 4
                                                         1.2.1 Non-official DVCA or ACA................................. 5
hardware security module when used in
                                                         1.2.2 eID servers......................................................... 5
combination with an eID server to access the online
functionality supported by Germany's electronic          R&S®CryptoServer....................................................... 6
ID card. It additionally provides an overview of the     2.1      User role concept.............................................. 7
official public key infrastructures for ePASS, eID and   2.2      Multi-client capability......................................... 8
                                                         2.3      Smart Cards....................................................... 8
eSIGN used in Germany.                                   2.4      Setting up and connecting the HSM................. 9
                                                         2.4.1 Powering up the HSM and setting the
                                                                  IP ­address.......................................................... 9
                                                         2.4.1.1 Power-up............................................................ 9
                                                         2.4.1.2 IP configuration................................................. 9
A Rohde & Schwarz product                                2.4.2 Running the CAT.jar and EIDKMT.jar manage‑
R&S®CryptoServer ­Deutschland HSM/3                               ment programs and installing the card reader... 9
PCI card and LAN appliance                               2.4.2.1 Java™ Runtime Environment............................ 9
                                                         2.4.2.2 ZIP archive with files for the eID interface......... 9
                                                         2.4.2.3 cyberJack card reader....................................... 9
                                                         2.4.3 Importing the eID firmware into the
                                                                 ­Deutschland HSM........................................... 10
                                                         2.4.4 Creating new administrator accounts.............. 11
                                                         2.4.4.1 Creating RSA keys on Smart Cards................. 11
                                                         2.4.4.2 Creating new administrators and assigning
                                                                 Smart Cards..................................................... 11
                                                         2.4.4.3 Deleting the default user ADMIN.................... 11
                                                         2.5     Administrator tasks.......................................... 12
                                                         2.5.1 Setting the time............................................... 12
                                                         2.5.2 Initializing Smart Cards.................................... 12
                                                         2.5.3 Creating users.................................................. 12
                                                         2.5.3.1 Key manager personalizer role......................... 13
                                                         2.5.3.2 Key manager role............................................. 14
                                                         2.5.3.3 Key user role.................................................... 15
                                                         2.6     Personalizer tasks............................................. 16
                                                         2.6.1 Domain parameters for importing elliptical
                                                                 curves.............................................................. 16
                                                         2.6.2 Creating the key encryption key (AES KEK)..... 16

                                                         Appendix..................................................................... 17
                                                         3.1   Firmware.......................................................... 17
                                                         3.2   Abbreviations................................................... 18
                                                         3.3   References....................................................... 18

                                                         Ordering information................................................ 19

2
Deutschland HSM for eID servers for the electronic ID card
Public key                  The following public key infrastructures (PKIs) in Germany
                            support the electronic ID card:
                            ❙❙ Country signing certificate authority (CSCA PKI)

­infrastructures            ❙❙ Country verifying certificate authority – electronic identity
                               (CVCA-eID PKI)

 for the electronic         The CVCA-eID has two certification authorities:
                            ❙❙ An official document verifying certificate authority
                               (DVCA)

 ID card                    ❙❙ A non-official or foreign DVCA, also known as the
                               authorization certificate authority (ACA)

                            In PKIs, hardware security modules (HSMs) such as the
                            R&S®CryptoServer do the following:
                            ❙❙ Create and store secret keys securely
                            ❙❙ Perform cryptographic functions using these secret keys
                               (e.g. encryption and signing)
                            ❙❙ Provide organizational security mechanisms that secure
                               administrative processes, such as the four-eyes principle

                            This section provides a short overview of PKIs, how they
                            are organized, and the role they fulfill. More detailed in‑
                            formation can be found on the website of the German
                            ­Federal Office for Information Security at
                             https://www.bsi.bund.de/EN/Topics/ElectrIDDocuments/
                             eIDcard/eIDcard_node.html.

                            1.1 Country signing certificate authority
                            (CSCA PKI)
                            The CSCA PKI manages certificates used in various tasks,
                            including:
                            ❙❙ Production of electronic ID documents (document signer
                               certificates)
                            ❙❙ Creation of certificate revocation lists of compromised
                               devices and passports (master revocation lists)
                            ❙❙ Securing of communications between sites (site
                               certificates)

                            The CSCA is the security anchor of Germany's official
                            ID documents. It is operated by the Federal Office for
                            ­Information Security (BSI). The CSCA's root certificate and
                             revocation list are of crucial importance and need to be
                             checked by eID servers.

                      Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  3
Deutschland HSM for eID servers for the electronic ID card
1.2 Country verifying certificate authority –
                                                                                       ­electronic identity PKI (CVCA‑eID PKI)
                                                                                       As defined in [CP-eID], CVCA-eID PKI has two certification
                                                                                       authorities (CAs):
                                                                                       ❙❙ An official document verifier CA (DVCA)
                                                                                       ❙❙ A non-official or foreign DVCA, also known as an
                                                                                          authorization CA (ACA)

                                                                                       The two CAs communicate with the root of the CVCA‑eID
                                                                                       at the BSI over a common communications interface
                                                                                       (single point of contact, SPOC). eID servers are part of the
                                                                                       ACA, and can be operated directly by an internet service
                                                                                       provider or the provider can use the services of a special‑
                                                                                       ized eID service provider.

    CVCA-eID PKI structure

                                                                 CVCA-eID
                                                                 root
                                               BSI website
                                                                                             CVCA-eID PKD
         Root (BSI)

                                                                            SPOC

                                            Official DVCA                        Non-official DVCA
         Document verifier

                                               DVCA                                    ACA                     VfB

                               Integrated          Distributed                Offline               Online
         Terminal

                            EAC box                                     Vending machine       eID server (internal or external)

4
Deutschland HSM for eID servers for the electronic ID card
1.2.1 Non-official DVCA or ACA                                         1.2.2 eID servers
The non-official DVCA is an authorization certificate issuer           The eID server extends an application server's identity
that authorizes the various ACAs. In Germany, this is the              management (IDM) by adding support for the electronic
Federal Office of Administration (in German “VfB”).                    ID card's eID applications. To accomplish this, the eID
                                                                       server needs to communicate with the ID card application
The ACA authorizes eID servers to access individual eID                (known as the ”AusweisApp”) that accesses the electronic
applications supported by the electronic ID card. The elec‑            ID card, and with the public key infrastructure. The eID
tronic ID card supports the following eID applications:                server uses the R&S®CryptoServer as a hardware security
❙❙ Readout of eID data                                                 module (HSM) to provide the encryption functionality for
❙❙ Verification of age and place of residence                          authorization certificates.
❙❙ Reloading for qualified electronic signatures
                                                                       For detailed information on eID servers, see [TR-3130].
To use each of these applications, the eID server must au‑
thenticate itself to the electronic ID card using a special
authorization certificate. The certificate is only valid for a
limited period. Depending on the eID application for which
it is issued, an authorization certificate may be valid any‑
where from a few days to several months. When the cer‑
tificate expires, it must be renewed.

Details of certificate validity periods are given in section
6.3.2 of [CP-eID].

Systems that communicate with an eID server

                                                                             Web application
                                                                             server with/
                                                          Web server         without IDM     DB server
       eID application

                                                                                                            Service provider

                         CSCA   Revocation list   ACA
                                                                        eID
                                                                        server
       PKI (CVCA/CSCA)

                                                                                 Key creation, storage, …

                                                               Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  5
Deutschland HSM for eID servers for the electronic ID card
R&S®CryptoServer                                    When used with an eID server, the R&S®CryptoServer per‑
                                                    forms the following tasks:
                                                    ❙❙ Creation and storage of secret keys
                                                    ❙❙ Creation of signatures

                                                    From a purely technical point of view, these are tasks
                                                    that could be carried out by any ordinary computer.
                                                    However, they are subject to rigorous security require‑
                                                    ments that call for a hardware security module (HSM)
                                                    such as the R&S®CryptoServer. The HSM enables keys
                                                    to be kept secret yet still be recognized as valid by the
                                                    electronic ID card. The keys are not allowed to leave the
                                                    R&S®CryptoServer, so the cryptographic functionality (digi‑
                                                    tal signatures) is performed on the HSM itself.

                                                    To ensure that keys remain stored securely, even during
                                                    special administrative tasks, the R&S®CryptoServer oper‑
                                                    ates with a user concept based on a strict division of roles
                                                    and the four-eyes principle.

                                                    The ­Deutschland HSM is a version of the
                                                    R&S®CryptoServer developed specially for use with the
                                                    electronic ID card.

                                                    The R&S®CryptoServer/­Deutschland HSM (or
                                                    ­Deutschland HSM for short) is equipped with a special
                                                     random number generator and a Java-based eID server in‑
                                                     terface, referred to in the sections that follow simply as the
                                                     eID interface.

The R&S®CryptoServer/­Deutschland HSM (PCI card).

6
Deutschland HSM for eID servers for the electronic ID card
2.1 User role concept                                                      ❙❙ RSA Smart Card: Another asymmetric method that
The ­Deutschland HSM user concept for eID servers is                          utilizes a user's RSA key stored on a Smart Card. In
based on separate user roles:                                                 contrast to the RSA signature method, it uses a PIN pad
❙❙ Administrators: Persons authorized to perform                              attached directly to the CryptoServer. Remote logon is
   administrative tasks such as creating user accounts                        not possible
❙❙ Key manager personalizers: Persons responsible for
   making fundamental cryptographic settings, such as                      The ­Deutschland HSM also supports the four-eyes prin‑
   defining the AES KEK or loading the parameters for                      ciple. Settings can only be made if at least two users (four-
   elliptical curve cryptography (ECC)                                     eyes principle) or, in some cases, three users (six-eyes
❙❙ Key manager: A program that manages authorization                       principle) are logged on.
   certificates for an eID server's clients
❙❙ Key user: The eID server that initiates the cryptographic               The table below summarizes the various roles, authenti‑
   functions (e.g. digital signature creation)                             cation methods and tasks for these roles when using the
                                                                           ­Deutschland HSM.
There are three options for a user to authenticate him‑
self to the ­Deutschland HSM (see section 2.3.2.4 of
[SGCS-Admin]):
❙❙ HMAC password: A symmetric authentication method
   in which the HMAC value of a random number is
   computed, transmitted and compared. The password
   serves as an HMAC key to determine the HMAC value
❙❙ RSA signature: An asymmetric authentication method
   in which a random number is signed using a private
   RSA key, transmitted, and then verified using a public
   RSA key. The user's private RSA key that was generated
   for this purpose is saved in a password-protected file
   and/or on a Smart Card. The user's public RSA key is
   stored in the CryptoServer

Roles and authentication methods
Role and logon level   Recommended                     Users                           Tasks (selected)
                       ­authentication method

Administrator          RSA signature                   At least two persons (better,   ❙❙ Create user accounts
22000000               (on a Smart Card)               three)                          ❙❙ Load firmware
                       using the four-eyes principle                                   ❙❙ Set time
                                                                                       ❙❙ Delete audit log

Key manager            RSA Smart Card                  At least two persons (better,   ❙❙ Generate AES KEK
personalizer           using the four-eyes principle   three)                          ❙❙ Load ECC domain parameters
00000200                                                                               ❙❙ Export and import signature keys securely

Key manager            HMAC password                   Program (e.g. to request        ❙❙ Create keys for certificate requests
00000020               using the four-eyes principle   ­authorization certificates)    ❙❙ Activate keys
                                                                                       ❙❙ Export and import signature keys securely

Key user               HMAC password                   Program (eID server)            ❙❙ Create signatures
00000002               using the four-eyes principle                                   ❙❙ Generate random numbers
                                                                                       ❙❙ Multiply EC points

                                                                    Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  7
Deutschland HSM for eID servers for the electronic ID card
2.2 Multi-client capability                                           2.3 Smart Cards
The R&S®CryptoServer/­Deutschland HSM is designed to                  In the ­Deutschland HSM's security concept, Smart Cards
protect the keys of multiple clients. It implements a sys‑            are used primarily for user authentication based on a com‑
tem of client assignment that links user accounts with                bination of possession (the Smart Card) and knowledge
specific keys.                                                        (the Smart Card's PIN). In addition, Smart Cards are used
                                                                      to store separate parts of the key encryption key (AES
When a user account is created, it is assigned an attribute           KEK). An initial set of ten Smart Cards (plus a PIN pad) is
that makes client assignment possible.                                supplied with the LAN appliance of the ­Deutschland HSM.
If these users are key managers, they can later only create           Additional Smart Cards must be purchased separately
keys for their assigned clients. Similarly, key users can only        if required. The information provided in the table below
create signatures using keys that have been generated                 is based on the assumption that seven Smart Cards are
specifically for their client.                                        in use.

Client assignment for user accounts and keys is controlled
by an entity attribute. Entities are entered as text and are
verified before cryptographic functions are executed.

Entities can include asterisks (*) and question marks (?) as
wild card characters. An asterisk stands for any number
of any characters; a question mark stands for any single
character.

Examples of users' client configuration
User account with entity attribute         Processable keys                              For users having these roles (for example)

*                                          All                                           Key manager personalizer (AES KEK manager)

sampleco*                                  All keys whose entity attribute begins        Key manager
                                           with “­sampleco” (e.g. “sampleco-cert”,
                                           “sampleco-certreq”)

sampleco-cert                              Only those keys with the entity attribute     Key user
                                           “sampleco-cert”

Use of Smart Cards
Smart Card number                          User authentication                           AES-KEK

1 to 3                                     3 administrators                              –

4 to 7                                     3 key manager personalizers                   4 × key parts for “2 of 4”

8
Deutschland HSM for eID servers for the electronic ID card
2.4 Setting up and connecting the HSM                            To install files, simply replace the libraries stored locally
2.4.1 Powering up the HSM and setting the                        with the files contained in the downloaded ZIP archive and
IP ­address                                                      then restart the computer.
First install the ­Deutschland HSM LAN appliance in a
­server cabinet, then connect it to the computer network         2.4.2.2 ZIP archive with files for the eID interface
 and assign a valid IP configuration.                            The CAT.jar and EIDKMT.jar programs are shipped
                                                                 in an archive file named eID.zip that is supplied by
2.4.1.1 Power-up                                                 ­Rohde & Schwarz SIT or Utimaco. The file also contains a
The ­Deutschland HSM LAN appliance has two power                  simulator, an interface description and eID firmware for
switches: one on the power supply unit on the rear, and           the ­Deutschland HSM. To install the programs, unpack the
another behind the panel on the front.                            ZIP archive file and double-click the programs in ­Windows
                                                                  Explorer. When CAT.jar and EIDKMT.jar are executed,
2.4.1.2 IP configuration                                          they must be configured with the IP address of the target
On the LAN appliance, use the buttons and display to set          ­Deutschland HSM (see section 2.4.1).
the IP address, subnet mask and gateway. The LAN ports
at the rear are arranged from left to right: Looking at the      2.4.2.3 cyberJack card reader
rear of the device, LAN port 1 is on the left and LAN port 2     The ReinerSCT cyberJack card reader that ships with
on the right.                                                    the ­Deutschland HSM LAN appliance can be connected
                                                                 ­directly to the HSM's PS/2 port or to a USB port on the
2.4.2 Running the CAT.jar and EIDKMT.jar manage-                  administration computer. To install the card reader on the
ment programs and installing the card reader                      administration computer, simply connect it to a USB port.
The ­Deutschland HSM is managed using two programs:               In the dialog box displayed by Windows Device Manager,
❙❙ CryptoServer administration tool (CAT.jar)                     select and install the cyberJack driver software contained
❙❙ eID key management tool (EIDKMT.jar)                           in the ZIP archive supplied with the Utimaco eID interface
                                                                  description.
2.4.2.1 Java™ Runtime Environment
Both management programs are Java-based, so Oracle's             Then run CAT.jar and choose the PIN pad type and port
Java™ Cryptography Extension (JCE) Unlimited Strength            ­under File ▷ Settings on the PIN Pad tab.
Jurisdiction Policy Files 6 must be installed on the com‑
puter being used to manage the ­Deutschland HSM. For
­legal reasons, these files are not shipped with the HSM,
 but they can be downloaded free from the Oracle website.

                                                                             CAT.jar: Setting the port type for the card reader.

                                                           Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  9
Deutschland HSM for eID servers for the electronic ID card
2.4.3 Importing the eID firmware into the
     ­­Deutschland HSM
     To import the eID firmware into the ­Deutschland HSM,
     run CAT.jar and log onto the HSM as user ADMIN. This is
     a default user account which authenticates itself to the
     ­Deutschland HSM with the init_dev_prv.key key file token
      (without a password). The key file token is included in the
      ZIP archive file that contains the eID interface description.

     Click the List All Files and List Firmware buttons to
     display an overview of the firmware installed on the
     ­Deutschland HSM. For the HSM to work with the elec‑
      tronic ID card, the firmware has to include the eID mod‑
      ule. A complete list of firmware modules is provided in
      section 3.1.

     To load the firmware, choose Firmware Management ▷
     Setup CryptoServer. In the dialog box, select the firm‑
     ware package and license file to load, and click Setup.
     The firmware package and license file are included in the
     ZIP archive file.

                CAT.jar: Logon dialog for default user ADMIN.

                CAT.jar: Loading eID firmware onto the ­Deutschland HSM.

10
2.4.4 Creating new administrator accounts                                Use the Add User button in User Management to add
Moving the ­Deutschland HSM into users' own crypto‑                      three new user accounts as shown in the table below.
graphic domain involves creating user accounts for at                    When you click OK, you will be prompted to assign the
least two (preferably three) administrators who can, for                 RSA key previously created on a Smart Card to the user
­example, set up user accounts using the four-eyes prin‑                 account. To do this, Smart Card access must be legitimat‑
 ciple. Administrators each have their own RSA key on a                  ed by entering a PIN. The default PIN is 123456. It can be
 Smart Card which they use to authenticate themselves to                 changed in CAT.jar by using the following menu sequence
 the ­Deutschland HSM (see section 2.1).                                 Key Tools ▷ Smart Card Management ▷ Change PIN.

2.4.4.1 Creating RSA keys on Smart Cards                                 2.4.4.3 Deleting the default user ADMIN
Run CAT.jar and use the menu sequence Key Tools ▷                        Once the administrator accounts have been created, the
Smart Card Management ▷ Generate to initialize the                       pre-configured default user ADMIN should be deleted us‑
three Smart Cards as shown in the table below.                           ing the Delete User button in User Management.

2.4.4.2 Creating new administrators and assigning
Smart Cards
Next, sign onto the ­Deutschland HSM using the default
user ADMIN. This default user account authenticates itself
to the ­Deutschland HSM using the init_dev_prv.key key file
token (without a password). The key file token is included
in the ZIP archive file that contains the Utimaco eID inter‑
face description.

                                                CAT.jar: Deleting the default
                                                user ADMIN.

CAT.jar: Generating RSA keys for administrators (initializing administrator Smart Cards)
Key Tools ▷ Smart Card Management ▷ Generate
Parameter                    Smart Card 1                            Smart Card 2                         Smart Card 3
RSA                          (selected)                              (selected)                           (selected)
Key info                     e.g. Admin 1                            e.g. Admin 2                         e.g. Admin 3
RSA key size                 2048 bit                                2048 bit                             2048 bit
Number of backups            0                                       0                                    0

CAT.jar: Creating administrators (parameters for new administrators)
User Management ▷ Add User
Parameter                    Administrator 1                         Administrator 2                      Administrator 3
User profile                 Customized                              Customized                           Customized
Name of new user             e.g. Admin 1                            e.g. Admin 2                         e.g. Admin 3
Authentication mechanisms    RSA signature                           RSA signature                        RSA signature
Hash method                  Default                                 Default                              Default
Group(s) of new users        11000000                                11000000                             11000000
                             (see section 2.3 in [SGCS-Admin])       (see section 2.3 in [SGCS-Admin])    (see section 2.3 in [SGCS-Admin])

Static login allowed         No                                      No                                   No
Secure messaging             Without authentication                  Without authentication               Without authentication
Attributes                                                                                  

                                                                 Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  11
2.5 Administrator tasks                                        To write information to a Smart Card, a Smart Card PIN
Subsequent administrative tasks can only be conducted          has to be entered at the card reader on the administration
if two of the previously created administrators are logged     computer. The default PIN is 123456. It can be changed
onto the ­Deutschland HSM with their Smart Cards (see          in CAT.jar using the menu sequence Key Tools ▷ Smart
section 2.4.4). CAT.jar is used to change the date and time    Card Management.
and to initialize more Smart Cards. Additional user ac‑
counts can then be set up using EIDKMT.jar.                    2.5.3 Creating users
                                                               Run EIDKMT.jar to manage user accounts. Right
2.5.1 Setting the time                                         click to open the popup menu. Go to the Devices tab
The date and time settings should be checked and               on the left side of the window to add and configure
changed if necessary. Run CAT.jar and choose the menu          ­Deutschland HSM devices. The specifier is the IP address
sequence Firmware Management ▷ Set Time.                        for LAN appliances or the slot in which the card is installed
                                                                (e.g. “PCI:0” or “/dev/cs2a”) for PCI cards.
2.5.2 Initializing Smart Cards
The following explanations are based on using Smart            To create users, at least two of the created adminis‑
Cards to authenticate to the ­Deutschland HSM (see table       trators (see section 2.4.4) must be logged onto the
in section 2.3). Three Smart Cards are created for the three   ­Deutschland HSM with their Smart Cards by clicking the
users who have the role of key manager personalizer ac‑         Logon button on the toolbar. Then click the Add button.
cording to the four-eye principle.

Run CAT.jar and initialize the Smart Cards by choosing the
menu sequence Key Tools ▷ Smart Card Management
▷ Generate as shown in the table below.

                                                                             EIDKMT.jar: Administrator logon.

CAT.jar: Initializing Smart Cards for key manager personalizers
Key Tools ▷ Smart Card Management ▷ Generate
Parameter                      Personalizer 1                  Personalizer 2                       Personalizer 3
RSA                            (selected)                      (selected)                           (selected)
Key info                       e.g. Personalizer 1             e.g. Personalizer 2                  e.g. Personalizer 3
sRSA key size                  2048 bit                        2048 bit                             2048 bit
No. of backups                 0                               0                                    0

12
2.5.3.1 Key manager personalizer role
Users assigned the role of key manager personalizer are
responsible for creating a key encryption key (KEK) for the
­Deutschland HSM and are known as AES KEK managers.
 To use the four-eyes principle, three AES KEK managers
 must be created as shown in the table below and assigned
 to the three initialized Smart Cards (see section 2.5.2).

Choose RSA Smart Card (MECH_RSA_SC) as the authen‑
tication method for AES KEK managers. This method only
permits authentication via a card reader connected directly
to the ­Deutschland HSM. If the card reader supplied is
still connected to the computer on which the Smart Cards
were initialized in CAT.jar, then it must be disconnected
and attached directly to the ­Deutschland HSM to create
the users. Assign each AES KEK manager a Smart Card.

                                                                               EIDKMT.jar: Creating the AES-KEK-Manager1 user account.

EIDKMT.jar: User parameters for key manager personalizers (AES KEK managers)
Logon ▷ Add
Name                           AES-KEK-Manager1                  AES-KEK-Manager2                    AES-KEK-Manager3
Entity                         *                                 *                                   *
Permissions                    00000100                          00000100                            00000100
Flags                          deny static login                 deny static login                   deny static login
Mechanism                      MECH_RSA_SC                       MECH_RSA_SC                         MECH_RSA_SC
Key source                     :CS2:cyb:COM1                     :CS2:cyb:COM1                       :CS2:cyb:COM1
                               (PIN pad on ­Deutschland HSM)     (PIN pad on ­Deutschland HSM)       (PIN pad on ­Deutschland HSM)

Password                                                                                 

                                                           Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  13
2.5.3.2 Key manager role
                                                          Although only one group of AES KEK managers (person‑
                                                          alizers) is needed per ­Deutschland HSM, separate users
                                                          for the Key Manager and Key User roles need to be cre‑
                                                          ated for each ­Deutschland HSM client. For instance, if two
                                                          companies – SampleCo and DummyCo – are sharing an
                                                          eID server, key managers must be created as follows for
                                                          both organizations in order to support the two-person rule:
                                                          ❙❙ Key-Manager 1-SampleCo
                                                          ❙❙ Key-Manager 2-SampleCo
                                                          ❙❙ Key-Manager 1-DummyCo
                                                          ❙❙ Key-Manager 2-DummyCo

                                                          The table below shows the two key managers that are to
                                                          be created for the client SampleCo. The entry in the entity
                                                          field indicates the client for the user account. This informa‑
                                                          tion is later compared with the entry attribute of the key
                                                          (see section 2.2).

                                                          The user names and passwords assigned are used to
                                                          authenticate the users or the eID server program to the
                                                          ­Deutschland HSM.

                                                                    EIDKMT.jar: Creating the Key-Manager 1-SampleCo user
                                                                    account.

EIDKMT.jar: User parameters for key managers for the client SampleCo
Logon ▷ Add
Name                      Key-Manager 1-SampleCo                         Key-Manager 2-SampleCo
Entity                    sampleco*                                      sampleco*
Permissions               00000010                                       00000010
Flags                     deny static login                              deny static login
Mechanism                 MECH_HMAC_PWD                                  MECH_HMAC_PWD
Key Source                                                 
Password                  password of first key manager                  password of second key manager

14
2.5.3.3 Key user role
                                                                Key users supporting the four-eyes-principle must also
                                                                be defined for each client. Key users can only access
                                                                their own user-specific keys and not all keys of the client.
                                                                ­Access is controlled by refining the entity attribute. In this
                                                                 example, the entity attributes have been set to the string
                                                                 “sampleco-cert” so that the eID server program's user
                                                                 ­account can be used to request authorization certificates
                                                                  for the client.

                                                                The table shows the parameters for the SampleCo client's
                                                                two key users. The two user names (User 1-SampleCo and
                                                                User 2-SampleCo) and their passwords must be assigned
                                                                to the eID server program so that they can authenticate
                                                                themselves to the ­Deutschland HSM.

                                                                            EIDKMT.jar: Creating the User1-SampleCo user account.

EIDKMT.jar: Key user parameters for requesting a certificate (cert)
Logon ▷ Add
Name                        User1-SampleCo                                       User 2-SampleCo
Entity                      sampleco-cert                                        sampleco-cert
Permissions                 00000001                                             00000001
Flags                       deny static login                                    deny static login
Mechanism                   MECH_HMAC_PWD                                        MECH_HMAC_PWD
Key Source                                                         
Password                    password of first key user                           password of second key user

                                                         Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  15
2.6 Personalizer tasks                                                  2.6.2 Creating the key encryption key (AES KEK)
Personalizers (AES KEK managers) have the following                     The AES KEK is used during runtime to encrypt the sig‑
tasks:                                                                  nature keys created and stored in the ­Deutschland HSM
❙❙ Importing domain parameters for the elliptical curves                before they are exported. The signature keys can then
   used for signatures                                                  be transferred securely and imported into another
❙❙ Managing the AES KEK                                                 ­Deutschland HSM. However, for this to function, the
                                                                         other ­Deutschland HSM must also possess the AES
They perform both of these tasks using the EIDKMT.jar pro‑               KEK. For this reason, a generated AES KEK can be stored
gram. ­EIDKMT.jar must be started, and at least two of the               once on the AES KEK managers' Smart Cards using the
three personalizers (AES KEK managers) must log on. To                   split key procedure. The AES KEK must be written to
log on, they need to insert their Smart Cards into the card              the cards using a card reader connected directly to the
reader, and the card reader must be connected directly to                ­Deutschland HSM. With at least two AES KEK managers
the ­Deutschland HSM.                                                     logged onto the ­Deutschland HSM, select the Generate
                                                                          KEK function on the popup menu (right click) to gener‑
2.6.1 Domain parameters for importing elliptical                          ate the key encryption key as shown in the table below
curves                                                                    and split it among the Smart Cards. Once it has been cre‑
At least two AES KEK managers (personalizers) must be                     ated, the AES KEK is split into a specified number of parts
logged onto the ­Deutschland HSM in order to import do‑                   (”N”), and the parts are sent to separate Smart Cards. This
main parameters. The import can then be started from the                  requires the PIN pad, which must be connected directly
popup menu (right click) using the Import EC Domain                       to the COM port on the ­Deutschland HSM. The AES KEK
Parameter function. Currently, 256 bit keys must be used                  managers' own Smart Cards can be used to store the key
for the eID server (see section 6.1.1 of [CP-eID]).                       parts. This will not overwrite their personal authentication
                                                                          keys.

                                                                                  EIDKMT.jar: Generating an AES KEK.

 EIDKMT.jar: AES KEK parameters
 "Generate KEK"
 Parameter                       Value
 Size                            256
 Name                            User-defined (e.g. AES-KEK1)
 Entity                          *
 Expiration date                 Expiration date in the format yymmdd
 K                               K of N key parts (Smart Cards) are needed in order to import an AES KEK into another ­Deutschland HSM
 N

16
Appendix
3.1 Firmware
The firmware currently installed on the ­Deutschland HSM can be read out and displayed by clicking the List Firmware
and List All Files buttons in the CAT.jar management program. A ­Deutschland HSM/3 with the following firmware
­modules is needed to work with the electronic ID card.

 ­Deutschland HSM/3 firmware modules
                                                 Module                             File name                           Version 1)
     Bootloader                                  Bootloader                                                             2.5.1.0
     System firmware modules                     Utility module                     util_3.0.0.3_c86.mtc                3.0.0.3
                                                 SMOS operating system              smos_2.5.0.6_c86.mtc                2.5.0.6
                                                 Administration module              adm_3.0.2.0_c86.mtc                 3.0.2.0
                                                 Command scheduler                  cmds_3.0.1.0_c86.mtc                3.0.1.0
                                                 Hash module                        hash_1.0.6.0_c86.mtc                1.0.6.0
                                                 Long number arithmetic version     lna_1.1.0.0_c64.mtc                 1.1.0.0
                                                 AES module                         aes_1.0.5.0_c86.mtc                 1.0.5.0
                                                 ECDSA module                       ecdsa_1.1.0.0_c86.mtc               1.1.0.0
                                                 RSA module                         vrsa_1.1.0.4_c86.mtc                1.1.0.4
                                                 Database module                    db_1.1.2.4_c86.mtc                  1.1.2.4
                                                 Elliptic curve arithmetic          eca_1.1.1.0_c86.mtc                 1.1.1.0
                                                 DES module                         vdes_1.0.3.0_c86.mtc                1.0.3.0
     Standard firmware modules                   Smart Card module                  sc_1.2.0.0_c86.mtc                  1.2.0.0
                                                 Master box key module              mbk_2.2.0.1_c86.mtc                 2.2.0.1
                                                 Asn1 module                        asn1_1.0.3.3_c86.mtc                1.0.3.3
                                                 PIN pad driver                     pp_1.2.3.1_c86.mtc                  1.2.3.1
     Applications                                Electronic ID module               eid_1.0.2.0_c86.mtc                 1.0.2.0

1)
      At time of printing; certified version may differ.

                                                                              Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  17
3.2 Abbreviations

Abbreviations
ACA              Authorization CA
AES              Advanced Encryption Standard (encryption algorithm)
AES KEK          Key Encryption Key using AES encryption
BSI              German Federal Office for Information Security
CA               Certificate Authority (of a PKI)
CAT(.jar)        CryptoServer Administration Tool (file extension for Java Archive)
CP               Certificate Policy
CSCA             Country Signing CA
CVCA             Country Verifying CA
DVCA             Document Verifying CA
EAC              Extended Access Control
ECC              Elliptic Curve Cryptology
eID              Electronic Identity card
EIDKMT(.jar)     eID Key Management Tool (file extension for Java Archive)
HMAC             Hash-based Message Authentication Code
HSM              Hardware Security Module
IDM              Identity Management
KEK              Key Encryption Key
PIN              Personal Identification Number
PKD              Public Key Directory
PKI              Public Key Infrastructure
QES              Qualified Electronic Signature
R&S              Rohde & Schwarz
TG               Technical Guideline (BSI)
VfB              German Authority for Authorization Certificates (German: “Vergabestelle für Berechtigungszertifikate”)

3.3 References

References
                 Der neue Personalausweis – Anwenderhandbuch für Wirtschaft und Verwaltung (The Electronic Identity Card – User Guide
                 for Business and Public Authorities, in German)
                 (http://www.personalausweisportal.de/cln_164/DE/Partner-werden/Diensteanbieter/diensteanbieter_node.html)
[CP-eID]         Certificate Policy für die eID-Anwendung des ePA, Version 1.26, October 14, 2010 (BSI)
                 (Certificate Policy for the eID Feature of the Electronic ID Card, in German)

[SGCSE-Admin]    SafeGuard® CryptoServer Manual for System Administrators
[TR-3110]        Technical Guideline “Advanced Security Mechanisms for Machine Readable Travel Documents”,
                 Version 2.0.5, October 14, 2010 (BSI)

[TR-3116-2]      Technische Richtlinie “eCard-Projekte der Bundesregierung”
                 (Technical Guideline for Federal Government eCard Projects, in German), 2010 Edition, Revision 1 (BSI)

[TR-3127]        Architecture electronic Identity Card and electronic Resident Permit (informative translation)
[TR-3128]        EAC-PKI’n für den elektronischen Personalausweis (EAC PKIs for the Electronic ID Card, in German),
                 Version 1.1, October 8, 2010 (BSI)

[TR-3129]        PKIs for Machine Readable Travel Documents, Version 1.10, November 9, 2009
[TR-3130]        Technische Richtlinie eID-Server (Technical Guidelines on eID Servers, in German), Version 1.4.1, October 8, 2010 (BSI)

18
Ordering information
Designation                                                                  Type                                  Order No.
R&S®CryptoServer/­Deutschland HSM
CC certification and BSI approval pending; deployable for eID servers, control systems, revocation services and electronic order placement systems;
all models are based on PCI cards
PCI card,                                                                      ­Deutschland HSM/3 CS10 PCI          5414.1300.22
performance level: 125 ECC signatures (256 bit) per second
PCI card,                                                                       ­Deutschland HSM/3 CS50 PCI         5414.1300.23
performance level: 1000 ECC signatures (256 bit) per second
LAN appliance, including 1 PIN pad and 10 Smart Cards                            ­Deutschland HSM/3 CS10 LAN        5414.1300.26
performance level: 125 ECC signature (256 bit) per second
LAN appliance, including 1 PIN pad and 10 Smart Cards                             ­Deutschland HSM/3 CS50 LAN       5414.1300.27
performance level: 780 ECC signatures (256 bit) per second
R&S®CryptoServer accessories
PIN Pad                                                                      R&S®CryptoServer PIN Pad              5414.1322.02
Smart Card                                                                   R&S®CryptoServer Smart Card           5414.1322.03
Large External Backup Battery for the R&S®CryptoServer PCI and PCIe          R&S®CryptoServer Backup Battery       5414.1322.04
                                                                             PCI/PCIe
Small On-Board Spare Battery for the R&S®CryptoServer PCI and PCIe           R&S®CryptoServer Spare Battery        5414.1322.05
                                                                             PCI/PCIe
Large On-Board Spare Battery for the R&S®CryptoServer LAN                    R&S®CryptoServer Spare Battery        5414.1322.06
                                                                             LAN

                                                                                                The R&S®CryptoServer front panel, LAN appliance.

                                                                                                The R&S®CryptoServer rear panel, LAN appliance.

                                                                     Rohde & Schwarz ­Deutschland HSM for eID servers for the electronic ID car  19
About Rohde & Schwarz
Service you can rely on       Rohde & Schwarz is an independent group of companies
J   Worldwide                 specializing in electronics. It is a leading supplier of solu‑
J   Local and personalized    tions in the fields of test and measurement, ­broadcasting,
J   Customized and flexible
J   Uncompromising quality    radiomonitoring and radiolocation, as well as secure
J   Long-term dependability   communications. Established more than 75 years ago,
                              ­Rohde & Schwarz has a global presence and a dedicated
                               service network in over 70 countries. Company headquar‑
                               ters are in Munich, Germany.

                              Environmental commitment
                              ❙❙ Energy-efficient products
                              ❙❙ Continuous improvement in environmental sustainability
                              ❙❙ ISO 14001-certified environmental management system

                                Certified Quality System

                                ISO 9001
                              Rohde & Schwarz SIT GmbH
                              Am Studio 3 | D-12489 Berlin
                              Phone +49 30 65884-223 | Fax +49 30 65884-184
                              E-Mail: info.sit@rohde-schwarz.com
                              www.sit.rohde-schwarz.com

                              www.rohde-schwarz.com

                              Regional contact
                              ❙❙ Europe, Africa, Middle East
                                 +49 89 4129 123 45
                                 customersupport@rohde-schwarz.com
                              ❙❙ North America
                                 1 888 TEST RSA (1 888 837 87 72)
                                 customer.support@rsa.rohde-schwarz.com
                              ❙❙ Latin America
                                 +1 410 910 79 88
                                 customersupport.la@rohde-schwarz.com
                              ❙❙ Asia/Pacific
                                 +65 65 13 04 88
                                 customersupport.asia@rohde-schwarz.com
                              R&S® is a registered trademark of Rohde & Schwarz GmbH & Co. KG
                              Trade names are trademarks of the owners | Printed in Germany (ch)
                              PD 5214.5678.92 | Version 01.00 | July 2011 | R&S®CryptoServer
                              Data without tolerance limits is not binding | Subject to change
                              ©  2011 Rohde & Schwarz GmbH & Co. KG | 81671 München, Germany

                              5214567892
You can also read