centre for applied cryptographic research workshop, nov. 8, 1999

21
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations Speakers: Les Biggs Pat Lareau November 8, 1999

Upload: rey

Post on 18-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Centre for Applied Cryptographic Research workshop, Nov. 8, 1999. Third party evaluations of CA cryptographic implementations Speakers: Les Biggs Pat Lareau November 8, 1999. What a cryptomodule provides the CA. Secure, trusted cryptographic services - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 1©1999 InfoGard Laboratories, Inc

Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Third party evaluations of CA cryptographic implementations

Speakers: Les Biggs

Pat Lareau November 8, 1999

Page 2: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 2©1999 InfoGard Laboratories, Inc

What a cryptomodule provides the CA

• Secure, trusted cryptographic services

• Key and certificate management services

• Physical protection of: > sensitive data (e.g. keys)> cryptographic and certificate management functions

• Enforcement of the CA’s security policy

Page 3: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 3©1999 InfoGard Laboratories, Inc

What FIPS 140-1 certification provides the CA: Assurance

• That the cryptomodule implements its security policy

• That sound cryptographic processes are employed

• That cryptographic processes are correctly implemented

• That Non-cryptographic processes are implemented as specified (Optional)

Page 4: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 4©1999 InfoGard Laboratories, Inc

Critical areas addressed by FIPS 140-1

• Key generation and management services

• Algorithm security

• Access control

• Interface control

• Physical protection for data and functions

• "Health" monitoring mechanisms

• EM emanations

• Assurance that the design implements the spec

Page 5: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 5©1999 InfoGard Laboratories, Inc

Level 1 Basic security requirements

Level 2 Tamper evidence, role-based authentication

Level 3 Enhanced physical security, identity-based authentication

Level 4-Envelope protectionEnvironmental protection, Formal Modeling

Increasin

g Secu

rity

FIPS 140-1 Security Levels

Page 6: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 6©1999 InfoGard Laboratories, Inc

Evaluation Vs Verification Vs Certification

• Evaluation > A self-guided examination of device characteristics by

a tester with credentials acceptable to the sponsor

• Verification > A self-guided process for verifying compliance to a

standard by a tester with credentials acceptable to the sponsor

• Certification> A formal, standardized testing process, performed by

an accredited laboratory, to validate claimed compliance to an official standard

Page 7: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 7©1999 InfoGard Laboratories, Inc

Validation Process Steps

ModuleDocumentation

Physical Product

ValidationTesting

ValidationPlan

Report Generation

Submit Report to NIST/CSE

Page 8: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 8©1999 InfoGard Laboratories, Inc

Validation Process Steps

Module Documentation

Physical Product

ValidationTesting

ValidationPlan

Report Generation

Submit Report to NIST/CSE

Page 9: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 9©1999 InfoGard Laboratories, Inc

Validation Process Steps

Module Documentation

Physical Product

ValidationTesting

ValidationPlan

Report Generation

Submit Report to NIST/CSE

Page 10: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 10©1999 InfoGard Laboratories, Inc

Validation Process Steps

Module Documentation

Physical Product

ValidationTesting

ValidationPlan

Report Generation

Submit Report to NIST/CSE

Page 11: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 11©1999 InfoGard Laboratories, Inc

Relative roles and positioning of FIPS 140-1 and CC in CA evaluations

FIPS is a detailed specification CC provides a language for developing

specifications

FIPS is a specific, detailed testing process CC provides a process for developing test

requirements

Page 12: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 12©1999 InfoGard Laboratories, Inc

Relative roles and positioning, cont’

FIPS addresses core cryptographic requirements

CC addresses system wide security objectives (may reference FIPS in the protection profile)

FIPS is mandated as an outgrowth of US federal law

CC is voluntary on an international scale

Page 13: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 13©1999 InfoGard Laboratories, Inc

Other critical CA processes may also be protected by the cryptomodule

Cryptomodule can be at the center of the CA, enforcing security rules Cert database protection from modification and

substitution Secure, strong database access control Secure database management secure, authenticated CA and database

communications/exchanges

Page 14: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 14©1999 InfoGard Laboratories, Inc

FIPS 140-1 naturally extends to non-federal sectors

• USPS

• DOD

• Banking

• Point of sale/credit card

• International support

Page 15: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 15©1999 InfoGard Laboratories, Inc

Snapshot program status

• Number of certifications

• Certifications by Level

• Certification levels Vs Time

• Physical configurations

Page 16: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 16©1999 InfoGard Laboratories, Inc

FIPS 140-1 Certifications

0

10

20

30

40

50

60

70

Nov-95Jan-96Mar-96May-96Jul-96Sep-96Nov-96Jan-97Mar-97May-97Jul-97Sep-97Nov-97Jan-98Mar-98May-98Jul-98Sep-98Nov-98Jan-99Mar-99May-99Jul-99Sep-99

Page 17: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 17©1999 InfoGard Laboratories, Inc

0

5

10

15

20

25

30

35

Level 1 Level 2 Level 3 Level 4

Certifications by Level

Page 18: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 18©1999 InfoGard Laboratories, Inc

Certification Level Vs Time

Page 19: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 19©1999 InfoGard Laboratories, Inc

Physical Configuration

Page 20: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 20©1999 InfoGard Laboratories, Inc

Module cost

• Levels 1 thru 3 gradually increase in cost> $100 to $ 800 range

• Big jump at level 4> $2,000 range

• Security levels should scale with CA’s level in the PKI

Page 21: Centre for Applied Cryptographic Research workshop, Nov. 8, 1999

Page 21©1999 InfoGard Laboratories, Inc

What we want to leave with you today

FIPS is not just crypto, it is a way of thinking about a problem

FIPS cryptomodules can implement and protect more than crypto

What distinguishes FIPS from other processes