Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408

Download
2020-9
Yener, Cansu
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certificates issued by the competent authorities. In addition to this standard, the FIPS 140 standard has been created, which specifies the requirements of cryptographic modules specifically and is used for the approval and verification of these modules. This standard is used to determine the reliability of cryptographic modules. In this thesis, we first define these standards and how the evaluation process in accordance with them takes place in the world and how they should be implemented in Turkey. Then, we discuss the vulnerabilities of the AES-GCM algorithm in order to prevent the vulnerabilities of the cryptographic algorithms used in the cryptographic algorithm verification process, which is a part of the cryptographic module verification process, and talk about alternative AES modes. Finally, we complete the thesis by talking about test vectors that help us detect these vulnerabilities.

Suggestions

Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
Metadiscourse analysis of digital interpersonal interactions in academic settings in Turkey
Hatipoğlu, Çiler (null; 2019-08-20)
Rapid technological advances, efficiency and easy access have firmly established emailing as a vital medium of communication in the last decades. Nowadays, all around the world, particularly in educational settings, the medium is one of the most widely used modes of interaction between students and university lecturers. Despite their important role in academic life, very little is known about the metadiscursive characteristics of these e-messages and as far as the author is aware there is no study that has ...
NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
Kamu kurumlarında teknolojik inovasyon ve inovasyon politikası
Arpacı, İbrahim (Orta Doğu Teknik Üniversitesi (Ankara, Turkey), 2011-8)
Bilgi ve iletişim teknolojilerindeki gelişmeler diğer sektörlerde olduğu gibi, hizmet sektöründe de inovasyonların önünü açmıştır. Hızlı değişen teknoloji, küresel rekabeti artırdığından büyüme, verimlilik, rekabetçilik, kârlılık ve en önemlisi hayatta kalabilmek için inovasyon yapmak zorunlu hale gelmiştir. Bu çalışmanın amacı Türk hükümetinin inovasyon politikasını anlamak için inovasyon sürecini, bu sürecin paydaşlarını, inovasyonun kaynaklarını, itici güçlerini ve önündeki engelleri tespit etmektir. Bu ...
Modeling Relations of Attitudes towards Technology Use Technology Competencies Ownership and Experiences to TPACKSelfEfficacy
Yerdelen Damar, Sevda; Aydın, Sevgi; Boz, Yezdan (2015-04-11)
This study modeled the relations of attitudes towards technology use, technology ownership, technology competency, and experience to self-efficacy of technological pedagogical content knowledge (TPACK-S). The study also investigated inter-relations among attitudes towards technology use, technology ownership, technology competency, and experience The participants of the study were 665 elementary pre-service science teachers (467 Females, 198 Males) from 7 colleges. The proposed model designed based on educa...
Citation Formats
C. Yener, “Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408,” M.S. - Master of Science, Middle East Technical University, 2020.