SP Reviewing The Standard. Stephan Müller atsec information security GmbH

Size: px
Start display at page:

Download "SP Reviewing The Standard. Stephan Müller atsec information security GmbH"

Transcription

1 SP Reviewing The Standard Stephan Müller atsec information security GmbH 13 ICMC 2013, September 24-26, Gaithersburg, MD 13

2 Agenda Practical aspects of implementing SP800-90A Helpful Requirements Challenges Proposed solutions Vendor feedback Implications of mandatory SP800-90B Proposed solutions Example Linux /dev/random device ICMC , September 24-26, Gaithersburg, MD 13 2

3 SP800-90A Helpful Requirements Previous standards (e.g. X9.31 Appendix A2.4) only defined RBG core SP800-90A covers entire life cycle of DRBG including: Seed and seed period requirements Sanity checks Prediction resistance considerations Practical application of DRBG is clearer now ICMC , September 24-26, Gaithersburg, MD 13 3

4 SP800-90A Challenges Complexity of state maintenance DRBG is very high SP800-90A contains 80 pages of specification X9.31 is half a page Complexity implies large implementation Large implementation is not suitable for sensitive environments Operating System Kernel High assurance environments Example: LOCs DRBG core, Hash-DRBG, HMAC-DRBG, CTR-DRBG OpenSSL: 550, 320, 220, 380 Mozilla NSS Hash DRBG: 750 Mine: 470, 240, 90, 320 (compare with microkernel: 5000 LOCs) ICMC , September 24-26, Gaithersburg, MD 13 4

5 SP800-90A HMAC DRBG State State size equals to cryptographic strength of cipher Size of Key, V is blocksize of cipher Key t+1 =HMAC(Key t, V t 1 Seed t ) V t+1 =HMAC(Key t+1, V t ) State is maintained by cipher No complex logic for establishing K and V for next round Inefficiency: HMAC for Key t+1 and V t+1 is calculated twice Complexity is slightly higher than to X9.31 ICMC , September 24-26, Gaithersburg, MD 13 5

6 SP800-90A Hash DRBG State State maintenance (addition of C, details of hash generation skipped): 440/888 V t Hash t + V t = 0 State of Hash DRBG is larger than cipher strength Hash is surjective function where a larger state does not increase cryptographic strength of DRBG State transition is driven by DRBG controlled update Addition of complexity without gain ICMC , September 24-26, Gaithersburg, MD 13 6

7 SP800-90A CTR DRBG State Most complex DRBG state maintenance Due to bijective property of cipher, any size translation of buffers requires effort Seed, additional data, personality string have arbitrary lengths Data used as input to cipher in DF / BCC contains a number of static 0x00 bytes DF / BCC: Reduction and subsequent expansion of input data using interlocking loops DF / BCC seed input Cipher blocksize DRBG seed State maintenance re-implements Counter mode to XOR with seed ICMC , September 24-26, Gaithersburg, MD 13 7

8 SP800-90A Proposed Solutions HMAC DRBG: update of K, V only once per round Hash DRBG: Size of state equal to hash block length Use hash as state transition function can this state transition function be worse than the byte-wise addition? Effort for addition of buffers can be dropped Use HMAC DRBG approach as a template CTR DRBG: Use cipher as state transition function Only reduce input data size, never enlarge an already reduced size complexity of DF / BCC can be reduced Update of key and state is a result generally defined cipher operation (e.g. SP800-38A Counter mode) complexity of state management can be reduced ICMC , September 24-26, Gaithersburg, MD 13 8

9 Vendor Feedback Applicable to DRBG in detail and FIPS in general Giving the user a greater choice and preventing monocultures by certifying multiple ciphers per cipher class: Symmetric ciphers Hashes ECC curves especially consider suggestions by Braintrust to have users generate their own curves based on known algorithm and random seed and publish the seed for verification (a la PQG generation) ICMC , September 24-26, Gaithersburg, MD 13 9

10 Implications of mandating SP800-90B Mandating of quasi-inclusion of seed source into validation Modules implementing certifiable cipher mechanisms but have no leverage over seed-source vendors cannot be certified Validation of module is prevented Reduction of choice of validated mechanisms Solution: NIST specifies pre-approved seed mechanism implementations and their potential usage requirements Constant re-assessments of commonly used seed sources is inefficient ICMC 2013, September 24-26, Gaithersburg, MD

11 Example: Usage Requirements for Linux /dev/random Ensure proper seed maintenance on target system /dev/random must not be used on a number of hardware architectures (lack of get_cycles function) see NIST must specify whether /dev/urandom can be used Ensuring that sufficient entropy is present in /dev/random at the first time the module technically could read seed, e.g.: By mandating that /dev/random seed is generated during initial installation, By requiring user interaction on console Ensure that module reads data from /dev/random appropriately e.g. a simple read() system call is not sufficient due to EINTR ICMC 2013, September 24-26, Gaithersburg, MD

Inside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016

Inside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Inside the World of Cryptographic Algorithm Validation Testing Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Mission To provide federal agencies in the United States and Canada with assurance

More information

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski About CygnaCom FIPS and Common Criteria Services Accredited testing laboratories NIAP, NIST, CSEC Professional Services PKI infrastructure

More information

Cryptographic Algorithm Validation Program:

Cryptographic Algorithm Validation Program: Cryptographic Algorithm Validation Program: Roadmap to Testing of New Algorithms Sharon Keller, CAVP Program Manager NIST November 6, 2015 Overview Process of developing validation tests for cryptographic

More information

/dev/random and Your FIPS Validation Can Be Friends

/dev/random and Your FIPS Validation Can Be Friends /dev/random and Your FIPS 140-2 Validation Can Be Friends Yes, Really Valerie Fenwick Manager, Solaris Cryptographic Technologies team Oracle May 19, 2016 Photo by CGP Grey, http://www.cgpgrey.com/ Creative

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

Tabular Presentation of the

Tabular Presentation of the Tabular Presentation of the Protection Profile for Application Software Version: 1.3 2018-03-07 National Information Assurance Partnership Revision History Version Date Comment Introduction This document

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_OSX_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple

More information

Worksheet for the Application Software

Worksheet for the Application Software Worksheet for the Application Software Security Functional Requirements FCS_RBG_EXT1 Random Bit Generation Services FCS_RBG_EXT11 for its cryptographic operations FCS_RBG_EXT21 perform all deterministic

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9 Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple

More information

Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Recommendation for Random Number Generation Using Deterministic Random Bit Generators NIST SP 800-90A January 2012 NIST Special Publication 800-90A Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker and John Kelsey Computer Security Division

More information

Linux Random Number Generator A New Approach

Linux Random Number Generator A New Approach Linux Random Number Generator A New Approach Stephan Müller September 17, 2017 Abstract The venerable Linux /dev/random served users of cryptographic mechanisms well for a long time.

More information

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks Pulse Cryptographic Module FIPS 140-2 Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 Copyright 2013 Juniper

More information

Key Management Interoperability Protocol Crypto Profile Version 1.0

Key Management Interoperability Protocol Crypto Profile Version 1.0 Key Management Interoperability Protocol Crypto Profile Version 1.0 Working Draft 0708 25 7 NovemberOctober 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert

More information

Protection Profile Summary

Protection Profile Summary NIAP Protection Profile for Mobile Device Management (PP_MDM_v2.0) PP link: Summary author: https://www.niap-ccevs.org/pp/pp_mdm_v2.0/ lachlan.turner@arkinfosec.net Date: 26 March 2015 Overview The NIAP

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of

More information

Spring 2010: CS419 Computer Security

Spring 2010: CS419 Computer Security Spring 2010: CS419 Computer Security MAC, HMAC, Hash functions and DSA Vinod Ganapathy Lecture 6 Message Authentication message authentication is concerned with: protecting the integrity of a message validating

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Random Bit Generators (Sections 8.1-8.3) February 20, 2018 Overview Today: HW 4 solution discussion Pseudorandom generation - concepts and simple techniques Reminder:

More information

RSA BSAFE Crypto-C Micro Edition Security Policy

RSA BSAFE Crypto-C Micro Edition Security Policy Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security

More information

Usage of SP800-56A in Industry Standard Protocols

Usage of SP800-56A in Industry Standard Protocols Usage of SP800-56A in Industry Standard Protocols Overview and Discussion Michael Powers Cryptographic & Security Testing Laboratory (CSTL) 6841 Benjamin Franklin Drive Columbia, MD 21046 NVLAP Lab Code:

More information

ryptograi "ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project

ryptograi ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project for ryptograi "ГС V6 е Tom St Denis, Elliptic Semiconductor Inc. and Author of the LibTom Project Simon Johnson Contents Preface Chapter 1 Introduction 1 Introduction 2 Threat Models 3 What Is Cryptography?

More information

SUSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0. FIPS Non-Proprietary Security Policy

SUSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0. FIPS Non-Proprietary Security Policy SSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0 Version 1.3 Last update: 2015-10-23 Prepared by: atsec information security corporation 9130 Jollyville Road, Suite 260 Austin,

More information

Commonly Accepted Keys and CSPs Initiative. International Cryptographic Module Conference (ICMC) Friday November 6 th, 2015

Commonly Accepted Keys and CSPs Initiative. International Cryptographic Module Conference (ICMC) Friday November 6 th, 2015 Commonly Accepted Keys and CSPs Initiative International Cryptographic Module Conference (ICMC) Friday November 6 th, 2015 CGI Group Inc. 2015 Introduction Ryan Thomas FIPS 140-2 Program Manager CGI Global

More information

TM ASSURANCE CONTINUITY MAINTENANCE REPORT FOR Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Android 6 (MDFPP20)

TM ASSURANCE CONTINUITY MAINTENANCE REPORT FOR Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Android 6 (MDFPP20) TM ASSURANCE CONTINUITY MAINTENANCE REPORT FOR Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Android 6 (MDFPP20) Maintenance Update of Samsung Electronics Co., Ltd. Samsung Galaxy Devices with

More information

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3

More information

Towards Post-Quantum Cryptography Standardization. Lily Chen and Dustin Moody National Institute of Standards and Technology USA

Towards Post-Quantum Cryptography Standardization. Lily Chen and Dustin Moody National Institute of Standards and Technology USA Towards Post-Quantum Cryptography Standardization Lily Chen and Dustin Moody National Institute of Standards and Technology USA First mile - Towards PQC standardization After about four years of preparation,

More information

Documentation and Analysis of the Linux Random Number Generator. Version: 2.3

Documentation and Analysis of the Linux Random Number Generator. Version: 2.3 Documentation and Analysis of the Linux Random Number Generator Version: 2.3 Document history Version Date Editor Description 0.1 2017-01-26 Stephan Müller Chapters 2 and 3 completed 0.2 2017-04-01 Stephan

More information

Hardcopy Device Protection Profiles Technical Community Update 2011

Hardcopy Device Protection Profiles Technical Community Update 2011 Hardcopy Device Protection Profiles Technical Community Update 2011 A status report and proposal for achieving the Collaborative PP vision Brian Smithson Ricoh Americas Corporation 28 September 2011 An

More information

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE INFORMATION TECHNOLOGY SECURITY GUIDANCE CRYPTOGRAPHIC ALGORITHMS FOR UNCLASSIFIED, PROTECTED A, AND PROTECTED B INFORMATION ITSP.40.111 August 2016 FOREWORD The Cryptographic Algorithms for UNCLASSIFIED,

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

Supporting Document Mandatory Technical Document. Full Drive Encryption: Encryption Engine. September Version 1.

Supporting Document Mandatory Technical Document. Full Drive Encryption: Encryption Engine. September Version 1. Supporting Document Mandatory Technical Document Full Drive Encryption: Encryption Engine September 015 Version 1.5 CCDB-015-01-004 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 3 4 5 6 7 8 9 30 31 3

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

IOS Common Cryptographic Module (IC2M)

IOS Common Cryptographic Module (IC2M) IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION

More information

Silent Circle Mobile Application Cryptographic Module

Silent Circle Mobile Application Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

Entropy as a Service. Apostol Vassilev Robert Staples. ICMC, May, 2016, Ottawa. Unlocking the full potential of cryptography

Entropy as a Service. Apostol Vassilev Robert Staples. ICMC, May, 2016, Ottawa. Unlocking the full potential of cryptography Entropy as a Service Unlocking the full potential of cryptography Apostol Vassilev Robert Staples ICMC, May, 2016, Ottawa A perspective Cryptography enjoys a Renaissance period of increasingly fast evolution

More information

AES Core Specification. Author: Homer Hsing

AES Core Specification. Author: Homer Hsing AES Core Specification Author: Homer Hsing homer.hsing@gmail.com Rev. 0.1.1 October 30, 2012 This page has been intentionally left blank. www.opencores.org Rev 0.1.1 ii Revision History Rev. Date Author

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

FIPS Security Level 2 Policy LX-4000T Series Console Servers

FIPS Security Level 2 Policy LX-4000T Series Console Servers FIPS 140-2 Security Level 2 Policy LX-4000T Series Console Servers MRV Communications Inc. 300 Apollo Dr. Chelmsford, MA. 01824 USA Document ID 445-RD-43 July 1, 2016 Version 1.16 1 Disclaimer MRV provides

More information

Generic collision attacks on hash-functions and HMAC

Generic collision attacks on hash-functions and HMAC Generic collision attacks on hash-functions and HMAC Chris Mitchell Royal Holloway, University of London 1 Agenda 1. Hash-functions and collision attacks 2. Memoryless strategy for finding collisions 3.

More information

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4. FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,

More information

Lecture 4: Hashes and Message Digests,

Lecture 4: Hashes and Message Digests, T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary

More information

ECE 646 Fall 2015 Term Project. Overview, comparison of open crypto libraries for application development. By Ravi Kota

ECE 646 Fall 2015 Term Project. Overview, comparison of open crypto libraries for application development. By Ravi Kota ECE 646 Fall 2015 Term Project Overview, comparison of open crypto libraries for application development. By Ravi Kota Goal How to determine which open source crypto library or libraries can be considered

More information

ECE 646 Lecture 8. Modes of operation of block ciphers

ECE 646 Lecture 8. Modes of operation of block ciphers ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.

More information

Brocade Fabric OS FIPS Cryptographic Module 8.2 User Guide

Brocade Fabric OS FIPS Cryptographic Module 8.2 User Guide USER GUIDE Brocade Fabric OS FIPS Cryptographic Module 8.2 User Guide Supporting Fabric OS 8.2.0 FOS-820-FIPS-Crypto-UG100 20 September 2018 Copyright 2018 Brocade Communications Systems LLC. All Rights

More information

FIPS Security Policy

FIPS Security Policy Version 1.8 Last Update: 09/4/2014 1 WideBand Corporation 401 West Grand Street, Gallatin, MO 64640, USA 1 The actual module is a single chip within the depicted package WideBand Corporation, 2014 and

More information

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.6 Prepared for: Prepared by: Symantec Corporation

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Next Topic in Cryptographic Tools Symmetric key encryption Asymmetric key encryption Hash functions and

More information

Network Working Group Request for Comments: 2085 Category: Standards Track NIST February HMAC-MD5 IP Authentication with Replay Prevention

Network Working Group Request for Comments: 2085 Category: Standards Track NIST February HMAC-MD5 IP Authentication with Replay Prevention Network Working Group Request for Comments: 2085 Category: Standards Track M. Oehler NSA R. Glenn NIST February 1997 Status of This Memo HMAC-MD5 IP Authentication with Replay Prevention This document

More information

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy i IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07 Security Policy Document ii Table of Contents 1 Document History... 1 2 Introduction... 2 2.1 References... 4 2.2 Document Organization...

More information

SMPTE Standards Transition Issues for NIST/FIPS Requirements

SMPTE Standards Transition Issues for NIST/FIPS Requirements SMPTE Standards Transition Issues for NIST/FIPS Requirements Contents 2010.5.20 DRM inside Taehyun Kim 1 Introduction NIST (National Institute of Standards and Technology) published a draft special document

More information

IKEv2-SCSI (06-449) Update

IKEv2-SCSI (06-449) Update 1 IKEv2-SCSI (06-449) Update David L. Black 2 IKEv2-SCSI (06-449) Plans and Status Plan Revise IKEv2-SCSI draft for approval at this meeting Reality The best laid schemes o' Mice an' Men... gang aft FCoE!!

More information

Assurance Activity Report (AAR) for a Target of Evaluation

Assurance Activity Report (AAR) for a Target of Evaluation Assurance Activity Report (AAR) for a Target of Evaluation Apple IOS 10.2 VPN Client on iphone and ipad Apple IOS 10.2 VPN Client Security Target Version 1.0, July 2017 Protection Profile for IPsec Virtual

More information

Network and System Security

Network and System Security Network and System Security Lecture 5 2/12/2013 Hashes and Message Digests Mohammad Almalag 1 Overview 1. What is a cryptographic hash? 2. How are hashes used? 3. One-Way Functions 4. Birthday Problem

More information

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018 FIPS 140-2 Non-Proprietary Security Policy Acme Packet VME FIPS 140-2 Level 1 Validation Software Version: E-CZ 8.0.0 Date: July 20, 2018 Document Version 2.0 Oracle Communications This document may be

More information

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec Network Working Group Request for Comments: 3566 Category: Standards Track S. Frankel NIST H. Herbert Intel September 2003 Status of this Memo The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec This

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

S. Erfani, ECE Dept., University of Windsor Network Security. All hash functions operate using the following general principles:

S. Erfani, ECE Dept., University of Windsor Network Security. All hash functions operate using the following general principles: 4.14 Simple Hash Functions All hash functions operate using the following general principles: a) The input string is viewed as a sequence of n-byte blocks. b) The input is processed one block at a time

More information

Oracle Linux 7 OpenSSH Server Cryptographic Module

Oracle Linux 7 OpenSSH Server Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-2.0.0 Date: September 25, 2017 Document Version 1.2 Oracle

More information

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 12 Message Authentication Codes At cats' green on the Sunday he took the message from

More information

BreakingVault SAP DataVault Security Storage vulnerabilities

BreakingVault SAP DataVault Security Storage vulnerabilities BreakingVault SAP DataVault Security Storage vulnerabilities Technical details Author: Fernando Russ (fruss@onapsis.com) Sr. Researcher Abstract: This document describes a series of vulnerabilities found

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell Data Protection Encryption Personal Edition Version 8.14.0 383-4-416 2 October 2017 v1.1 Government of Canada. This document is the property of the Government

More information

NIAP Update. Dianne Hale National Information Assurance Partnership

NIAP Update. Dianne Hale National Information Assurance Partnership NIAP Update Dianne Hale National Information Assurance Partnership 18 May 2017 NIAP Policy #5 All cryptography in the TOE for which NIST provides validation testing of FIPS-approved and NISTrecommended

More information

Security Policy Document Version 3.3. Tropos Networks

Security Policy Document Version 3.3. Tropos Networks Tropos Control Element Management System Security Policy Document Version 3.3 Tropos Networks October 1 st, 2009 Copyright 2009 Tropos Networks. This document may be freely reproduced whole and intact

More information

FIPS Security Policy

FIPS Security Policy Red Hat Enterprise Linux 6.6 OpenSSH Client Cryptographic Module v3.0 Version 3.2 Last Update: 2015-09-11 Contents 1.Cryptographic Module Specification... 3 1.1.Description of Module... 3 1.2.Description

More information

Data Integrity & Authentication. Message Authentication Codes (MACs)

Data Integrity & Authentication. Message Authentication Codes (MACs) Data Integrity & Authentication Message Authentication Codes (MACs) Goal Ensure integrity of messages, even in presence of an active adversary who sends own messages. Alice (sender) Bob (receiver) Fran

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

FireEye CM Series: CM-4400, CM-7400, CM-9400

FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

FIPS Compliance of Industry Protocols in Edward Morris September 25, 2013

FIPS Compliance of Industry Protocols in Edward Morris September 25, 2013 FIPS 140-2 Compliance of Industry Protocols in 2014 Edward Morris September 25, 2013 Topics Abstract Background DES SP 800-57 SP 800-131 The Protocols IPsec TLS SSH Others Challenges & Recommendations

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication Security Policy 02.08.12 RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication This document is a non-proprietary security policy for RSA BSAFE Crypto-J

More information

A Roadmap for High Assurance Cryptography

A Roadmap for High Assurance Cryptography A Roadmap for High Assurance Cryptography Harry Halpin harry.halpin@inria.fr @harryhalpin (Twitter) NEXTLEAP (nextleap.eu) Harry Halpin Prosecco Thanks to Peter Schwabe (Radboud University) Harry.halpin@inria.fr

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

On the Practical Exploitability of Dual EC in TLS Implementations

On the Practical Exploitability of Dual EC in TLS Implementations On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway 1, Matt Fredrikson 2, Ruben Niederhagen 3, Adam Everspaugh 2 Matt Green 1, Tanja Lange 3, Tom Ristenpart 2, Dan Bernstein

More information

FIPS Security Policy UGS Teamcenter Cryptographic Module

FIPS Security Policy UGS Teamcenter Cryptographic Module FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product

More information

CIS 4360 Secure Computer Systems Symmetric Cryptography

CIS 4360 Secure Computer Systems Symmetric Cryptography CIS 4360 Secure Computer Systems Symmetric Cryptography Professor Qiang Zeng Spring 2017 Previous Class Classical Cryptography Frequency analysis Never use home-made cryptography Goals of Cryptography

More information

Misuse-resistant crypto for JOSE/JWT

Misuse-resistant crypto for JOSE/JWT Misuse-resistant crypto for JOSE/JWT Neil Madden OAuth Security Workshop, 2018 1 JOSE Content Encryption Methods Provide authenticated encryption AES-CBC with HMAC-SHA2 Requires random 128-bit IV Must

More information

Internet Engineering Task Force (IETF) Request for Comments: 6194 Category: Informational. IECA P. Hoffman VPN Consortium March 2011

Internet Engineering Task Force (IETF) Request for Comments: 6194 Category: Informational. IECA P. Hoffman VPN Consortium March 2011 Internet Engineering Task Force (IETF) Request for Comments: 6194 Category: Informational ISSN: 2070-1721 T. Polk L. Chen NIST S. Turner IECA P. Hoffman VPN Consortium March 2011 Security Considerations

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

Oracle Linux 6 OpenSSH Server Cryptographic Module

Oracle Linux 6 OpenSSH Server Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 6 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R6-1.0.0 Date: September 28, 2017 Document Version 1.3 Oracle

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011 Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6149 IECA Obsoletes: 1319 L. Chen Category: Informational NIST ISSN: 2070-1721 March 2011 Abstract MD2 to Historic Status This document

More information

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N

More information

ECE 646 Lecture 7. Modes of Operation of Block Ciphers. Modes of Operation. Required Reading:

ECE 646 Lecture 7. Modes of Operation of Block Ciphers. Modes of Operation. Required Reading: C 646 Lecture 7 Modes of Operation of Block Ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5th dition, Chapter 6 Block Cipher Operation II. A. Menezes, P. van Oorschot,

More information

What is the Cryptographic Boundary? Ying-Chong Hedy Leung Senior Consultant atsec information security corp.

What is the Cryptographic Boundary? Ying-Chong Hedy Leung Senior Consultant atsec information security corp. What is the Cryptographic? Ying-Chong Hedy Leung Senior Consultant atsec information security corp. hedy@atsec.com ICMC atsec2016, internal, MaySeptember 18-20, 2016, 18, Shaw 2014,Centre CST Lab Ottawa,

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

FIPS Crypto In the IoT. Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC

FIPS Crypto In the IoT. Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC FIPS 140-2 Crypto In the IoT Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC Outline A. B. C. D. E. Intro to wolfssl Overview of wolfcrypt FIPS FIPS 140-2 Challenges in the

More information

POWER7+ Accelerated Encryption and Random Number Generation for Linux

POWER7+ Accelerated Encryption and Random Number Generation for Linux POWER7+ Accelerated Encryption and Random Number Generation for Linux Kent Yoder IBM Linux Technology Center February 22, 2013 Contents 1 Introduction 2 2 Hardware Architecture

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

Vortex. A New Family of One-Way Hash Functions. Based on AES Rounds and Carry-less Multiplication. Intel Corporation, IL

Vortex. A New Family of One-Way Hash Functions. Based on AES Rounds and Carry-less Multiplication. Intel Corporation, IL Vortex A New Family of One-Way Hash Functions Based on AES Rounds and Carry-less Multiplication Shay Gueron Michael E. Kounavis Intel Corporation, IL Intel Corporation, US and University of Haifa, IL Information

More information

Approved vs. non-approved: Decoding the Language

Approved vs. non-approved: Decoding the Language Approved vs. non-approved: Decoding the Language Yi Mao, Ph.D., CISSP Deputy Lab Director atsec information security corp. Email: yi@atsec.com atsec information security 2013 Magic Eye 2 Agenda FIPS 140-2

More information