Show/Hide Menu
Hide/Show Apps
anonymousUser
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Açık Bilim Politikası
Açık Bilim Politikası
Frequently Asked Questions
Frequently Asked Questions
Browse
Browse
By Issue Date
By Issue Date
Authors
Authors
Titles
Titles
Subjects
Subjects
Communities & Collections
Communities & Collections
Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408
Download
12625933.pdf
Date
2020-9
Author
Yener, Cansu
Metadata
Show full item record
Item Usage Stats
14
views
11
downloads
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certificates issued by the competent authorities. In addition to this standard, the FIPS 140 standard has been created, which specifies the requirements of cryptographic modules specifically and is used for the approval and verification of these modules. This standard is used to determine the reliability of cryptographic modules. In this thesis, we first define these standards and how the evaluation process in accordance with them takes place in the world and how they should be implemented in Turkey. Then, we discuss the vulnerabilities of the AES-GCM algorithm in order to prevent the vulnerabilities of the cryptographic algorithms used in the cryptographic algorithm verification process, which is a part of the cryptographic module verification process, and talk about alternative AES modes. Finally, we complete the thesis by talking about test vectors that help us detect these vulnerabilities.
Subject Keywords
CMVP
,
AMVP
,
Common Criteria
,
AES-GCM
,
Vulnerabilities
URI
https://hdl.handle.net/11511/69038
Collections
Graduate School of Applied Mathematics, Thesis