Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.

Slides:



Advertisements
Similar presentations
© Crown Copyright (2000) Module 2.6 Vulnerability Analysis.
Advertisements

© Crown Copyright (2000) Module 2.3 Functional Testing.
Security Requirements
© Crown Copyright (2000) Module 2.5 Operational Environment.
Module 1 Evaluation Overview © Crown Copyright (2000)
© Crown Copyright (2000) Module 3.2 Evaluation Management.
© Crown Copyright (2000) Module 2.2 Development Representations.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Manager, Product Evaluation
Larry Wagner Sr. Director of Engineering
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
The Common Criteria for Information Technology Security Evaluation
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
Prepared By: Certified Compliance Solutions, Inc. August 2012
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Graduated CC Protection Profiles for Cryptographic Modules Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security)
1 Terrie Diaz/ James Arnold 27 September 2007 Threats, Policies, and Assumptions in the Common Criteria What is the target of evaluation anyhow?
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Writing a Research Proposal
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
Smartcard Evaluation TM8104 – IT Security Evaluation Linda Ariani Gunawan.
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Evaluating Systems Information Assurance Fall 2010.
1 A Disciplined Security Specification for a High- Assurance Grid by Ning Zhu, Jussipekka Leiwo, and Stephen John Turner Parallel Computing Centre Distributed.
ITEC 3220M Using and Designing Database Systems
1 Omissions and errors in the CC Who got it right? 8ICCC Denise Cater.
Lecture 15 Page 1 CS 236 Online Evaluating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Marking Scheme ISM ISM Top-up. Project Contents Abstract, – A one page summary (max. 400 words) of the Intent, work undertaken. Introduction, – An overview.
Background. History TCSEC Issues non-standard inflexible not scalable.
Page 1 ISO/IEC JTC 1/SC 7/WG 7 N Summary of the Alignment of System and Software Life Cycle Process Standards The material in this briefing.
SOFTWARE DESIGN (SWD) Instructor: Dr. Hany H. Ammar
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
FIPS Status and Schedules Allen Roginsky CMVP NIST September 28, 2005.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
FOURTH EUROPEAN QUALITY ASSURANCE FORUM "CREATIVITY AND DIVERSITY: CHALLENGES FOR QUALITY ASSURANCE BEYOND 2010", COPENHAGEN, NOVEMBER IV FORUM-
Lecture 7: Requirements Engineering
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
Common Criteria V3 Overview Presented to P2600 October Brian Smithson.
CMSC : Common Criteria for Computer/IT Systems
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
WORKPLAN FINALISATION. TEMPLATE FOR INDICATIVE WORKPLAN.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
TM8104 IT Security EvaluationAutumn Evaluation - the Main Road to IT Security Assurance CC Part 3.
======!"§==Systems= Technical Guidance for CC Evaluation Wolfgang Killmann T-Systems GEI GmbH.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008.
1 IMDS data use CLEPA Materials Regulations Event ( ) Presented by Sylvia Aßmann Dr. Stefan Dully On behalf of Supplier Alliance (SUAL)
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
The Common Criteria for Information Technology Security Evaluation
ITEC 3220A Using and Designing Database Systems
Ch.18 Evaluating Systems - Part 2 -
8ICCC Update for IEEE P2600 Brian Smithson Ricoh Americas Corporation
Chapter 19: Building Systems with Assurance
James Arnold/ Jean Petty 27 September 2007
9th International Common Criteria Conference Report to IEEE P2600 WG
Final Conference in Paris WP6 – Protection Profiles Specification
How to Read a Paper (Practice: CCS’14)
ACSC 155 System Analysis and Design 4. Systems Design
Presentation transcript:

Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view Nobuhiro TAGASHIRA Canon Inc.

P. 1 Copyright (C) 2007, Canon Inc. All rights reserved. Contents 1.Background 2.The Common Criteria Evaluation vs The Cryptographic Module Validation 1.Proposal 1 (Developer ’ s Explanation) 2.Proposal 2 (new framework) 3.Conclusion

P. 2 Copyright (C) 2007, Canon Inc. All rights reserved. Background in Japan Common Criteria (CC) Evaluation :  In 2001, JISEC was established  In 2003, JISEC became a member of CCRA Cryptographic Module (CM) Validation :  In 2006, JCMVP was started a shadow testing  In 2007, JCMVP was established * JISEC : Japan Information Technology Security Evaluation and Certification Scheme * JCMVP : Japan Cryptographic Module Validation Program

P. 3 Copyright (C) 2007, Canon Inc. All rights reserved. Activities in Canon Common Criteria (CC) Evaluation :  CCEVS-VR from CCEVS (US Scheme)  C0010/C0012/C0020/C0027/C0032/C0036/ C0050 from JISEC Cryptographic Module (CM) Validation :  F0002 from JCMVP

P. 4 Copyright (C) 2007, Canon Inc. All rights reserved. The Common Criteria Evaluation Standard :ISO/IEC (Common Criteria) Methodology :CEM Target :TOE (a set of S/W, F/W and/or H/W) Top Description :Security Target Flow :ST Evaluation -> TOE Evaluation Levels :EAL1 to EAL7 Action : Evaluation Etc :8 Security Assurance Classes

P. 5 Copyright (C) 2007, Canon Inc. All rights reserved. The Cryptographic Module Validation Standard :ISO/IEC (FIPS 140-2) Methodology :DTR (Derived Test Requirements) Target :Cryptographic Module Top Description :Security Policy Flow :Algorithm Testing -> Module Testing Levels :Security Level 1 to 4 Action : Testing Etc :11 security areas

P. 6 Copyright (C) 2007, Canon Inc. All rights reserved. CC Evaluation vs CM Validation The CC Evaluation and CM Validation are different in  Abstractness  Focus of tests [B2-04][B2-05] [B2-04] Nithya Rachamadugu, “ FIPS-US Cryptographic Testing Standard ”, ICCC 2005 [B2-05] Axel Boness, “ A FIPS evaluation could authorize CC-like tests ”, ICCC 2005 But these are the same in the point of the view of Third Party Validation Scheme in the IT security world. In some cases, the CM validation is very effective in the cryptographic functionality of the CC Evaluation.

P. 7 Copyright (C) 2007, Canon Inc. All rights reserved. Question!  Have the CC Evaluation and CM validation produced a synergistic effect? Answer  NO

P. 8 Copyright (C) 2007, Canon Inc. All rights reserved. Problems and Countermeasures under the CC Evaluation and CM Validation Problems 1. It is difficult for an end user to understand the validity of the CC Evaluation and CM Validation. Countermeasures CNTM1. A developer has to explain the validity of the CC Evaluation and CM Validation to an end user in the ST. CNTM2. The CC Specifications has to define the new framework for using the CM Validation.

P. 9 Copyright (C) 2007, Canon Inc. All rights reserved. Proposal 1 for CNTM1 (Developer ’ s Explanation) Write a ST, which clearly describes the TOE and the CM, so that an end user can understand. Point :  It is NOT necessary to change a structure of the ST.  There are some sections, which describes the CM.

P. 10 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 1) for Proposal 1  ST reference  TOE reference  Identify the Cryptographic Module, which is in the TOE.  TOE overview  TOE description  In the description of the physical scope of the TOE, describe the physical scope of the CM, and a relationship between the TOE and the CM.  In the description of the logical scope of the TOE, describe the logical scope of the CM, and a relationship between the TOE and the CM.  If the CM has some modes of the operation (e.g. CMVP mode), describe the usages of the modes of the operation of the CM in the logical description.

P. 11 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 2/3/4/5) for Proposal 1  Conformance claims  Security problem definition  Security objectives  Extended components definition Same descriptions as the normal ST

P. 12 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 6.1) for Proposal 1  Security functional requirements  “ Refinement operations ” are required. e.g. From “ The TSF shall …” to “ The TSF (CM) shall …”.  If the ST selects some components from FCS/FPT classes, the developer has to do “ Refinement operations ” of the requirement that the CM enforces. – FCS_COP : Cryptographic services – FCS_CKM : Cryptographic key management – FPT_TST : Self-tests – FPT_PHP : Physical security (if the CM is validated at the level 3 or 4)

P. 13 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 6.1) (con ’ t)  Security functional requirements  If the CSPs in CM are user data of the TOE, the developer may have to do “ Refinement operations ” of some components in FDP classes.  If the CSPs in CM are TSF data, the developer may have to do “ Refinement operations ” of some components in FMT classes.  If the CM is validated at the level 1 or higher, especially level 3 or 4, the developer may have to do “ Refinement operations ” of some components in FIA classes. CSP : Critical Security Parameter. (e.g. Cryptographic keys, authentication data)

P. 14 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 6.2/6.3) for Proposal 1  Security assurance requirements  Security requirements rationale Same descriptions as the normal ST

P. 15 Copyright (C) 2007, Canon Inc. All rights reserved. ST Description (Chap. 7) for Proposal 1  TOE summary specification Same descriptions as the normal ST

P. 16 Copyright (C) 2007, Canon Inc. All rights reserved. Proposal 2 for CNTM2 (new framework) Define the new CC framework, which effectively reuse the CM Validation. Point :  The Cryptographic Module may be a COTS product, and a developer may be a user of that. In this case, it is difficult for the developer to make design documents for the CC Evaluation.  This situation is a very similar problem to a composed TOE, so we could use the same analogy as ACO class.

P. 17 Copyright (C) 2007, Canon Inc. All rights reserved. Study 1 (I/F, functionality) for Proposal 2 Interfaces and functionalities of the CM are tested while testing. There are NO big impact on Composition rationale (ACO_COR), Development evidence (ACO_DEV), Reliance of dependent component (ACO_REL), And Composed TOE testing (ACO_CTT).

P. 18 Copyright (C) 2007, Canon Inc. All rights reserved. Study 2 (vulnerability) for Proposal 2 There are no vulnerability analysis of the CM. There are big impact on Composition vulnerability analysis (ACO_VUL).

P. 19 Copyright (C) 2007, Canon Inc. All rights reserved. Countermeasures for Proposal 2 1. Propose to ISO/IEC WG that vulnerability analysis is tested while testing the CM. or 2. Define a new family that supports a new Composition vulnerability analysis (ACO_VUL) for an independent cryptographic module test.

P. 20 Copyright (C) 2007, Canon Inc. All rights reserved. Conclusion This paper shows  the problem between the CC Evaluation and the CM Validation.  the proposal for the developer, and CC schemes. This paper is also useful, during the acquisition of the some CC/CM validated products. Future work  We have to examine a proposal 2 in detail in the viewpoint of feasibility.  FIPS is planned. We have to examine between the CC Evaluation and the new CM Validation.

P. 21 Copyright (C) 2007, Canon Inc. All rights reserved. Thank you Nobuhiro TAGASHIRA Canon Inc.