Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408

Download
2020-9
Yener, Cansu
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certificates issued by the competent authorities. In addition to this standard, the FIPS 140 standard has been created, which specifies the requirements of cryptographic modules specifically and is used for the approval and verification of these modules. This standard is used to determine the reliability of cryptographic modules. In this thesis, we first define these standards and how the evaluation process in accordance with them takes place in the world and how they should be implemented in Turkey. Then, we discuss the vulnerabilities of the AES-GCM algorithm in order to prevent the vulnerabilities of the cryptographic algorithms used in the cryptographic algorithm verification process, which is a part of the cryptographic module verification process, and talk about alternative AES modes. Finally, we complete the thesis by talking about test vectors that help us detect these vulnerabilities.

Suggestions

Motivators and barriers in the development of online communities of practice
Baran, Bahar; Çağıltay, Kürşat (2010)
Problem Durumu: Eğitim alanında yıllardan beri devam eden temel tartışmalardan birisi, öğrenmenin nasıl gerçekleştiği ile ilgilidir. “Uygulama Topluluğu” yaklaşımı, bu tartışmaya farklı bir bakış açısı getirmiştir. Bu yaklaşım, yetişkin insanları sosyal varlıklar olarak kabul eder ve öğrenmenin gerçekleşebilmesi için, onların sosyal etkileşim ortamlarında, aktif olarak bulunmaları gerektiğini savunur. Bilim insanları, öğretmenlerin “öğretmeyi öğrenme” sürecinde elde etmeleri gereken pratik bilgiyi kazanmala...
Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
Innovation Center Proposal in the Context of Sme’s and Problems in Turkish Industry
Gürsu, Hakan (null; 2018-12-26)
Günümüzde ülke sanayisinin yüzde 99.8’ini oluşturan KOBİ’ler küresel rekabet edilebilirlikleri, ülke ekonomisine katma değer sağlamaları ile ülke sanayisinin gelişiminde büyük rol oynamaktadır. Dünya ekonomisinde ürün odaklı, verimlilik artışı sağlayan üretim stratejileri uygulanmaktadır. Bilim, teknoloji ve tabanlı çalışmalarda etkin ve aktif olamayan işletmelerin nitelikli ürüne ulaşmamaları bölgesel ve ülke kalkınmasında hedeflenen gelişmenin yakalanaması sonucunu doğurmaktadır. Türkiye’de 500.000’nin üs...
Metadiscourse analysis of digital interpersonal interactions in academic settings in Turkey
Hatipoğlu, Çiler (null; 2019-08-20)
Rapid technological advances, efficiency and easy access have firmly established emailing as a vital medium of communication in the last decades. Nowadays, all around the world, particularly in educational settings, the medium is one of the most widely used modes of interaction between students and university lecturers. Despite their important role in academic life, very little is known about the metadiscursive characteristics of these e-messages and as far as the author is aware there is no study that has ...
NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
Citation Formats
C. Yener, “Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408,” M.S. - Master of Science, Middle East Technical University, 2020.