Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408
Download
12625933.pdf
Date
2020-9
Author
Yener, Cansu
Metadata
Show full item record
Item Usage Stats
587
views
439
downloads
Cite This
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certificates issued by the competent authorities. In addition to this standard, the FIPS 140 standard has been created, which specifies the requirements of cryptographic modules specifically and is used for the approval and verification of these modules. This standard is used to determine the reliability of cryptographic modules. In this thesis, we first define these standards and how the evaluation process in accordance with them takes place in the world and how they should be implemented in Turkey. Then, we discuss the vulnerabilities of the AES-GCM algorithm in order to prevent the vulnerabilities of the cryptographic algorithms used in the cryptographic algorithm verification process, which is a part of the cryptographic module verification process, and talk about alternative AES modes. Finally, we complete the thesis by talking about test vectors that help us detect these vulnerabilities.
Subject Keywords
CMVP
,
AMVP
,
Common Criteria
,
AES-GCM
,
Vulnerabilities
URI
https://hdl.handle.net/11511/69038
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Motivators and barriers in the development of online communities of practice
Baran, Bahar; Çağıltay, Kürşat (2010)
Problem Durumu: Eğitim alanında yıllardan beri devam eden temel tartışmalardan birisi, öğrenmenin nasıl gerçekleştiği ile ilgilidir. “Uygulama Topluluğu” yaklaşımı, bu tartışmaya farklı bir bakış açısı getirmiştir. Bu yaklaşım, yetişkin insanları sosyal varlıklar olarak kabul eder ve öğrenmenin gerçekleşebilmesi için, onların sosyal etkileşim ortamlarında, aktif olarak bulunmaları gerektiğini savunur. Bilim insanları, öğretmenlerin “öğretmeyi öğrenme” sürecinde elde etmeleri gereken pratik bilgiyi kazanmala...
Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
Innovation Center Proposal in the Context of Sme’s and Problems in Turkish Industry
Gürsu, Hakan (null; 2018-12-26)
Günümüzde ülke sanayisinin yüzde 99.8’ini oluşturan KOBİ’ler küresel rekabet edilebilirlikleri, ülke ekonomisine katma değer sağlamaları ile ülke sanayisinin gelişiminde büyük rol oynamaktadır. Dünya ekonomisinde ürün odaklı, verimlilik artışı sağlayan üretim stratejileri uygulanmaktadır. Bilim, teknoloji ve tabanlı çalışmalarda etkin ve aktif olamayan işletmelerin nitelikli ürüne ulaşmamaları bölgesel ve ülke kalkınmasında hedeflenen gelişmenin yakalanaması sonucunu doğurmaktadır. Türkiye’de 500.000’nin üs...
Metadiscourse analysis of digital interpersonal interactions in academic settings in Turkey
Hatipoğlu, Çiler (null; 2019-08-20)
Rapid technological advances, efficiency and easy access have firmly established emailing as a vital medium of communication in the last decades. Nowadays, all around the world, particularly in educational settings, the medium is one of the most widely used modes of interaction between students and university lecturers. Despite their important role in academic life, very little is known about the metadiscursive characteristics of these e-messages and as far as the author is aware there is no study that has ...
NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
C. Yener, “Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408,” M.S. - Master of Science, Middle East Technical University, 2020.