| Âê̾ | A Proposal of a Knowledge-based Tool to Support ST Developers on Acquisition of Cryptographic Requirements |
| Ãø¼Ô | *Guillermo Horacio Ramirez Caceres (Graduate School of Engineering, Soka University), Atsuo Inomata (Nara Institute of Science and Technology), Yoshimi Teshigawara (Graduate School of Engineering, Soka University) |
| Page | pp. 1510 - 1515 |
| Keyword | Security Evaluation, Cryptographic Requirements, Knowledge-based |
| Abstract | At the present time, owing to advance of the broadband mobile communications and the Internet, many home users are enjoying services of IT revolution. Nevertheless, only limited people are aware of the danger of information eavesdropping and privacy invasion, when it comes to security policies. The security information can be understood as the ability of an information system which uses the Evaluation Assurance Levels (EAL) as defined in international standards ISO/IEC 15408 to avoid all accidents or malicious deliberate actions. Accidents and actions which will endanger availability, integrity, and confidentiality of stored or transmitted data as well as corresponding services offered by these networks and systems. Many international standards exist in the IT security field. We have been developing a knowledge-based tool based on multiple international standards. In this paper, we propose a new knowledge-based tool based on FIPS 140-2 and SP 800-57 in addition to ISO/IEC 15408(CC), ISO/IEC 15446, ISO/IEC 13335, ISO/IEC 17799, and ISO/IEC 19791. ISO/IEC 15408 also known as Common Criteria (CC) for Information Technology Security Evaluation is an international standard used as the basis to evaluate the security properties of IT products. CC Part 3 describes 7 security requirements package used for the evaluation, called Evaluations Assurance Level (EAL). In order to evaluate IT products based on CC, developers must create security target (ST). According to CC, the subject of criteria for the assessment of the inherent qualities of cryptographic algorithms is not covered in the CC. However, the Target of evaluation (TOE) may employ cryptographic functionality to help to satisfy several high level security objectives. In this case, ST developers must be able to refer to an external standard. FIPS 140-2 are different from the CC in the abstractness and focus of tests. FIPS 140-2 testing is against a defined cryptographic module and provides a suite of conformance tests to four security levels. All these 2500-odd pages about these international standards may not be the biggest issue. The principal problem of these international standards is the technical languages used with the large number of unfamiliar and technical terms. Specifically, on the cryptographic field, there are too many new technical words, and several standards to apply for cryptography. All these make the contents difficult to understand and the ST developer must read many times when trying to create a ST for evaluation. From the FIPS 140-2 point of view, FIPS 140-2 specifies 11 security requirements to secure design and implementation of cryptographic module. In addition, 4 security levels are specified for each of 11 requirement areas. According to FIPS 140-2, if the operational environment is modifiable, the operating system requirements of the CC are applicable at Security Levels 2 and above. This knowledge-based tools works as a web application and will be able to access at http://teshilab.net. The knowledge-based tool supplements deficiency in ST developer¡Çs knowledge by allowing easy access to often complex but necessary information on international standards and security requirements for cryptographic modules. In addition, this knowledge-based tool can also be used to support ST developers to understand the Cryptographic Module Validation Program (CMVP) process. Most of the information on FIPS 140-2, CC and other standards, are graphically displayed on this site. In addition, references in the same standards or to other standards are graphically represented, to help user to read and understand this relationships. Finally, we are working to include in this knowledge-based tool, other important international standards and special publication from NIST to support other aspect of cryptography and risk assessment as our future works. |
| Âê̾ | ¥»¥¥奢Ä̿®¥¢¡¼¥¥ƥ¯¥ãGSCIP¤ò¼¸½¤¹¤륰¥롼¥״ÉÍý¥µ¡¼¥ФμÂÁõ¤ȱ¿ÍÑɾ²Á |
| Ãø¼Ô | *º£¼ ·½ͤ, ÎëÌÚ ½¨ÏÂ, ¸åƣ ͵»Ê, ÅÏî´ ¹¸ (̾¾ëÂç³ØÂç³ر¡Íý¹©³ظ¦µæ²Ê) |
| Page | pp. 1516 - 1522 |
| Keyword | ¥»¥¥å¥ê¥ƥ£, IPsec, KINK, Ä̿®¥°¥롼¥×, ¥¤¥ó¥ȥé¥ͥåÈ |
| Abstract | ¥¤¥ó¥ȥé¥ͥåȤǤϴë¶Ȥ¬´ÉÍý¤¹¤ë¸Ŀ;ðÊó¤Îϳ±̤ʤɡ¤¼Ұ÷¤äÆâÉô´ط¸¼ԤÎÉÔ¤ˤè¤ëÈȺ¿¤¯Êó¹𤵤ì¤Ƥ¤¤롥¤·¤«¤·¤ʤ¬¤顤¥¤¥ó¥ȥé¥ͥåÈÆâÉô¤Υ»¥¥å¥ê¥ƥ£Âкö¤ϥ桼¥¶̾¤ȥѥ¹¥¥ɤˤè¤ë´Êñ¤ÊÁê¼êǧ¾ڡ¤¥¢¥¯¥»¥¹¸æÄøÅ٤·¤«¹Ԥï¤ì¤Ƥ¤¤ʤ¤¤Τ¬¸½¾õ¤Ǥ¢¤롥¤½¤Τ¿¤á´ë¶ȥͥåȥ¥¯¤ˤª¤¤¤ƥ»¥¥å¥ê¥ƥ£¤ò³ÎÊݤ¹¤뤿¤á¤ˡ¤ÉôÌç¤ä¶È̳¤˱þ¤¸¤¿Ä̿®¥°¥롼¥פò¹½Ãۤ·¡¤°ŹæÄ̿®¤ò¹Ԥ¦¤³¤ȤÏͭ¸ú¤ʼêÃʤǤ¢¤롥¤½¤³¤Dz桹¤ϽÀÆð¤ȥ»¥¥å¥ê¥ƥ£¤ò·ó¤ÍÈ¿¥ͥåȥ¥¯¤γµǰ¤Ȥ·¤ÆFPN¡ÊFlexible Private Network¡ˤȸƤ֥·¥¹¥ƥà¤òÄ·¤Ƥ¤¿¡¥FPN¤ò¶ñÂÎŪ¤˼¸½¤¹¤뤿¤á¤ÎÄ̿®¥¢¡¼¥¥ƥ¯¥ã¤Ȥ·¤ÆGSCIP¡ÊGrouping for Secure Communication for IP¡ˤò¸¡Ƥ¤·¤Ƥ¤¤롥GSCIP¤ǤÏüËê°¤¹¤ëÄ̿®¥°¥롼¥ס¤¤ª¤è¤Óưºî¥⡼¥ɤÎÁȤ߹ç¤碌¤ˤè¤ꡤÄ̿®¤βÄÈݤª¤è¤ӰŹæÄ̿®¤Î̵ͭ¤òưŪ¤˷èÄꤹ¤뤳¤Ȥ¬¤Ǥ¤롥GSCIP¤δÉÍý¤ϡ¤¥°¥롼¥״ÉÍý¥µ¡¼¥ÐGMS¡ÊGroup Management Server¡ˤǹԤ¦¡¥GMS¤ǤÏÄ̿®¥°¥롼¥פÈưºî¥⡼¥ɤÎÄ굤¤ª¤è¤ӥ°¥롼¥°¤Î¡¤¹¹¿·¤ʤɤò¹Ԥ¦¡¥ËܹƤǤϥ¤¥ó¥ȥé¥ͥåȤˤª¤¤¤ÆGSCIP¤ÈIPsec¤줾¤챿ÍѤ¹¤ë¾ì¹ç¤Ëȯ¤¹¤ë´ÉÍýÉé²٤òÄêÎÌŪ¤˵á¤ᡤͭ¸ú¤ò³Îǧ¤¹¤롥 |
| Âê̾ | ¥ǥ¸¥¿¥ë¥ǡ¼¥¿¾ڵòÊÝ¥ץé¥åȥե©¡¼¥à¡ØDig-Force¥·¥¥º¡٤γ«ȯ¤Èɾ²Á |
| Ãø¼Ô | *°²Ìî ͤ¼ù (ÅìµþÅŵ¡Âç³ØÂç³ر¡Àèü²ʳص»½Ѹ¦µæ²ʾðÊóÄ̿®¥á¥ǥ£¥¢¹©³ØÀ칶), ƣÅÄ ·½ʹ, Æþ߷ ËãΤ»Ò, º´¡¹ÌÚ Îɰì (ÅìµþÅŵ¡Âç³ØÂç³ر¡¹©³ظ¦µæ²ʾðÊóÄ̿®¥á¥ǥ£¥¢³ØÀ칶) |
| Page | pp. 1523 - 1530 |
| Keyword | ¥ǥ¸¥¿¥ë¥ե©¥ì¥å¯, TPM, ¥, ¥ҥ¹¥ƥꥷ¥¹½ð̾, ¥«¥á¥é |
| Abstract | ¡¡¶áǯ¡¤¥¤¥¼¥ͥåȤÎÉáµڤËȼ¤¤¡¤¥³¥ó¥ԥ塼¥¿¤ò»Ȥä¿ÈȺá¤ä¥ȥé¥֥뤬Áý¤¨¤Ƥ¤¤롥¤ޤ¿Ʊ»þ¤ˡ¤ˡ²ÊÂç³ر¡¤ÎÀßÃ֤äºÛȽ°÷Å٤ʤɤˤè¤ꡤÁʾ٤¬¤è¤ê¿ȶá¤ˤʤäƤ¤Ƥ¤¤롥¤·¤¿¤¬¤äơ¤Áʾ٤ǥǥ¸¥¿¥ë¥ǡ¼¥¿¤¬½ÅÍפʾڵò¤Ȥ·¤Ƽè¤갷¤ï¤ì¤륱¡¼¥¹¤¬Áý¤¨¤Æ ¤¯¤ë¤¤ȹͤ¨¤é¤ì¤롥 ¡¡¤³¤¦¤·¤¿¾ËÈ뤿¤ᡤ´ë¶ȤǤϡ¤¡Ê1¡˥³¥ó¥ԥ塼¥¿¤ˤè¤ë¥ǥ¸¥¿¥ë¥ǡ¼¥¿¤μ谷Ãæ¤Ë¤¸¤ëºî¶ȤΤ³¤óÀפäºî¶ȤÎÍúÎò¤ò¥ǥ¸¥¿¥ë¥ǡ¼¥¿¤Ȥ·¤ƳÎÊݤ·¡¤¡Ê2¡ËÁʾ٤³¤¹¤±¤ǤϤʤ¯Áʾ٤µ¤줿ºݤǤâÀâÌÀÀÕǤ¤¬²̤¿¤»¤ë¤褦¤ˤ¹¤뤿¤á¤μê½ç¤䵻½ѤǤ¢¤ë¥ǥ¸¥¿¥ë¥ե©¥ì¥å¯¡ʰʲ¼¡¤DF¡ˤÎÈÅÍפˤʤäƤ¤Ƥ¤¤롥 ¡¡¥ǥ¸¥¿¥ë¥ե©¥ì¥å¯¥·¥¹¥ƥà¡ʰʲ¼¡¤DF¥·¥¹¥ƥà¡ˤȤϡ¤¥³¥ó¥ԥ塼¥¿¤¬ưº¤¿ÆâÍƤòµϿ¤·¡¤¸夫¤鸡¾ڤ¬¤Ǥ¤ë¤褦¤ʥ³¥ó¥ԥ塼¥¿¥·¥¹¥ƥà¤Ǥ¢¤롥ɮ¼Ԥé¤ϡ¤¤³¤ÎDF¥·¥¹¥ƥà¤ϡ¤ÀßÃַÁÂ֤ˤè¤ꣲ¼ïÎà¤ËʬÎष¤¿¡¥°ì¤Ĥϡ¤´ÉÍý¤µ¤줿¥ͥåȥ¥¯´Ķ²¼¤ÇÍøÍѤ¹¤ë¥ͥåȥ¥¯·¿¤ȡ¤¤½¤ì°ʳ°¤ξì½ê¤ÇÍøÍѤ¹¤륹¥¿¥ó¥ɥ¢¥í¥Ǥ¢¤롥 ¡¡¥ͥåȥ¥¯·¿¤ϥ³¥ó¥ԥ塼¥¿¤òÁ຤뽾¶Ȱ÷¤¬°¤·¤Ƥ¤¤ëÁȿ¥¤¬´ÉÍý¤¹¤ë¥ͥåȥ¥¯¡ʰʲ¼¡¤´ÉÍý¤µ¤줿¥ͥåȥ¥¯¡ˤò²𤷤ƥ³¥ó¥ԥ塼¥¿¤ò°층´ÉÍý¤·¤Ƥ¤¤뤿¤á¥ꥢ¥륿¥¤¥à¤Çưºî¤ò´ƻ뤹¤뤳¤Ȥ¬¤Ǥ¤롥¥ͥåȥ¥¯·¿¤ÎDF¥·¥¹¥ƥà¤ϴë¶ȤˤâƳÆþ¤µ¤ì¤Ϥ¸¤á¤Ƥ¤Ƥª¤ꡤ´ØϢ¸¦µæ¤⤤¤¤í¹Ԥï¤ì¤Ƥ¤¤롥¤·¤«¤·¤ʤ¬¤顤½¾¶Ȱ÷¤Υ³¥ó¥ԥ塼¥¿¤ˤè¤ëºî¶ȤϾï¤˴ÉÍý¤µ¤줿¥ͥåȥ¥¯´Ķ²¼¤Ǥ¢¤ë¤Ȥϸ¤é¤ʤ¤¡¥´ÉÍý¤µ¤줿¥ͥåȥ¥¯¤ËÀܳ¤µ¤ì¤Ƥ¤¤ʤ¤¥³¥ó¥ԥ塼¥¿¤ǽ¾¶Ȱ÷¤κî¶ȤòµϿ¤¹¤뤿¤á¤ˤϡ¤¥¹¥¿¥ó¥ɥ¢¥í¥ÎDF¥·¥¹¥ƥबɬÍפǤ¢¤롥¤³¤Τ褦¤ʥ¹¥¿¥ó¥ɥ¢¥í¥ó´Ķ²¼¤ǤÎDF¥·¥¹¥ƥà¤θ¦µæ¤Ïɮ¼Ԥ餬ÃΤ븤ê¤ǤϽ¾Íè¹Ԥï¤ì¤Ƥ³¤ʤ«¤ä¿¡¥ ¡¡¥¹¥¿¥ó¥ɥ¢¥í¥ó´Ķ²¼¤Ǥϡ¤¥³¥ó¥ԥ塼¥¿¤Îưºî¤ò¥ꥢ¥륿¥¤¥à¤Ǵƻ뤷¤¿¤ꡤ¥ϡ¼¥ɥǥ£¥¹¥¯¤ò¼è¤곰¤¹¤Ȥ¤¤ä¿ʪÍýŪ¤ʺî¶Ȥò¥§¥å¯¤¹¤뤳¤Ȥ¬¤Ǥ¤ʤ¤¤³¤Ȥ«¤顤¥ͥåȥ¥¯·¿¤è¤ê¤â¾ڵò¥ǡ¼¥¿¤ËÂФ¹¤ëÉÔ¤ËÂѤò»ý¤ÄɬÍפ¬¤¢¤롥 ¡¡¤½¤³¤Çɮ¼Ԥé¤ϡ¤¥ҥ¹¥ƥꥷ¥¹½ð̾¤ȰŹ浡ǽ¤ò»ý¤ä¿¥»¥¥å¥ê¥ƥ£¥ǥХ¤¥¹¤òÍѤ¤¤뤳¤Ȥˤè¤ꡤ¡Ê1¡˥¹¥¿¥ó¥ɥ¢¥í¥ó´Ķ²¼¤ǡ¤¡Ê2¡˥³¥ó¥ԥ塼¥¿¤ÎÁàºî¤ò¹Ԥ¨¤Ðɬ¤ºµϿ¤¬»Ĥë¤褦¤ˤ¹¤ë¤ȤȤâ¤ˡ¤¡Ê3¡ËÁ຤¿¿ͤòÆÃÄꤷ¡¤¡Ê4¡˵Ͽ¤·¤¿¥ǡ¼¥¿¤¬²þ¤¶¤ì¤Ƥ¤¤ʤ¤¤³¤Ȥò¸夫¤éÂ軰¼Ԥ¬¸¡¾ڤǤ¤륹¥¿¥ó¥ɥ¢¥í¥ó·¿DF¥·¥¹¥ƥà¡ÖDig-Force¡פò¹ͰƤ·¤¿¡¥ ¡¡¼ºݤ˥ץí¥ȥ¿¥¤¥פò³«ȯ¤·¡¤¸¡¾ڤò¹Ԥä¿·ë²̡¤°Â¤ι⤤DF¥·¥¹¥ƥà¤Ǥ¢¤뤳¤Ȥ¬ʬ¤«¤ä¿¤¬¡¤DF¥·¥¹¥ƥà¤γƥץ¥é¥बÉÔ¤ËÊѹ¹¤µ¤ì¤ʤ¤¤Ȥ¤¤¦Ä¢¤뤿¤ᡤDig-Force¤ò¼¸½¤¹¤뤿¤á¤ˤϿ·¤¿¤ʤ븡Ƥ¤¬ɬÍפȤʤä¿¡¥ ¡¡¤½¤³¤ǡ¤Dig-Force¤ò¤è¤ê°Â¤Ëưº¤»¤뤿¤á¤ËTrusted Platform Module¤òÍѤ¤¤ơ¤DF¥·¥¹¥ƥà¤ΰ¤ڤǤ¤륷¥¹¥ƥà¡ÖDig-Force2¡פò³«ȯ¤·¤¿¡¥¤³¤ÎDig-Force2¤òÍѤ¤¤ÆDF¥·¥¹¥ƥà¤Îưºî¤òÊݾڤ¹¤ë¤±¤Ǥʤ¯¡¤ÉÔ¤ʥץ¥é¥बưº¤ʤ¤´Ķ¤òºî¤ê½Ф¹¤³¤Ȥ¬¤Ǥ¤¿¡¥ ¡¡¤ޤ¿¡¤Dig-Force¤Υ¢¥ץꥱ¡¼¥·¥ç¥ó¤Ȥ·¤ơ¤°åÎŴط¸¤ʤɤθ½¾ì¤ؤÎƳÆþ¤òÁÛÄꤷ¤¿¥·¥¹¥ƥà¡ÖMILY¡פò¹ͰƤ·¤¿¡¥¤³¤Υ·¥¹¥ƥà¤ϡ¤¥³¥ó¥ԥ塼¥¿¤ʤɤΥǥ¸¥¿¥ë¥ǡ¼¥¿¤Î¾¡¤¥«¥á¥é¤ˤè¤뻣±Ƥò¥ǡ¼¥¿¤Ȥ·¤ÆƱ»þ¤˽èÍý¤¹¤뤳¤Ȥ«¤顤¥³¥ó¥ԥ塼¥¿°ʳ°¤Υǡ¼¥¿¤ò¥¥ǡ¼¥¿¤Ȥ·¤Ƽè¤갷¤¨¤뤳¤ȤòÆÃħ¤Ȥ·¤Ƥ¤¤롥MILY¤ò¼¸½¤¹¤뤳¤Ȥˤè¤ꡤ¼ê½Ѥθ½¾ì¤ˤª¤¤¤ƤϿ´ÅſޤäǾÇȤʤɤȤȤâ¤˽ÑÃæ¤á¥é¤ˤè¤äƻ£±Ƥ·¡¤¤½¤ì¤é¤òDig-Force¤ò¥١¼¥¹¤Ȥ·¤¿DF¥·¥¹¥ƥà¤ËÃßÀѤ¹¤뤳¤Ȥˤè¤ꡤ°åÎŻö¸ΤʤɤˤâÂбþ¤Ǥ¤ëʪ¤ȹͤ¨¤Ƥ¤¤롥 ¡¡ËܹƤǤϡ¤Dig-Force¤βòÀâ¤ȡ¤Dig-Force2µڤÓMILY¤Υץí¥ȥ¿¥¤¥פòºî¤·ͭÍѤò¸¡Ƥ¤·¤¿¤ΤÇÊó¹ð¤ò¹Ԥ¦¡¥ |
| Âê̾ | ¿ÁØËɸæ¤γµǰ¤˴ð¤Ť¯¥ꥹ¥¯¤ÈÂкö¸ú²̤Υâ¥ǥ벽¤˴ؤ¹¤븡Ƥ |
| Ãø¼Ô | *²Ãƣ ¹°°ì, ļ»Ȳϸ¶ ²ij¤ (ÁϲÁÂç³ØÂç³ر¡) |
| Page | pp. 1531 - 1540 |
| Keyword | ¥ꥹ¥¯ʬÀÏ, ¿ÁØËɸæ, ¥ե©¥ë¥ȥĥ²òÀÏ, ¥ꥹ¥¯¥â¥ǥë, ¥٥¤¥¸¥¢¥ó¥ͥåȥ¥¯ |
| Abstract | °ìÈ̤ˡ¤Áȿ¥¤Υͥåȥ¥¯¤ˤª¤±¤ë¥ꥹ¥¯¤äÂкö¤ϡ¤¤¢¤ë¥ꥹ¥¯¤θ²º߲½¤¬¾¤Υꥹ¥¯¤θ²º߲½¤òͶȯ¤¹¤ë¤ʤɤΥꥹ¥¯´֤ΰ͸´ط¸¡¤ʣ¿ô¤Υꥹ¥¯¤˸ú²̤òȯ´ø¤¹¤ëÂкö¤Î¸ºߤʤÉʣ»¨¤ʴط¸¤ò»ý¤äƤ¤¤롥¤½¤Τ¿¤ᡤ¥ꥹ¥¯¤Î³ΤÊÇİ®¤ÈŬÀڤÊÂкö¤ηèÄê¤ÏÍưפǤϤʤ¤¡¥¤µ¤é¤ˡ¤²桹¤Ϥ³¤ì¤ޤǡ¤ÂкöÊѹ¹¤òȼ¤¦¥ͥåȥ¥¯ÆÃÊÌÍøÍѻþ¤ˤª¤¤¤ƥ»¥¥å¥ê¥ƥ£¤ò°ݻý²Äǽ¤ÊÂкö·èÄê¼êˡ¤ò¸¡Ƥ¤·¤Ƥ¤¿¤¬¡¤Âкꥹ¥¯¸²º߲½¤ΤɤÎÃʳ¬¤ͥåȥ¥¯¾å¤Τɤ³¤ÇÍÞ¤·¤Ƥ¤¤ë¤Τ«¤¬ÉÔÌÀÎƤǤ¢¤ä¿¡¥¤½¤³¤ÇËܹƤǤϡ¤¥ꥹ¥¯¤¬¸²º߲½¤¹¤ëή¤ì¤ò¾õÂÖ°ܿޤÇɽ¸½¤·¡¤Âкö¤Èʻ¤»¤ƥͥåȥ¥¯¥â¥ǥë¾å¤ØÇÛÃ֤¹¤롥¤³¤ì¤ˤè¤ꡤ¥ꥹ¥¯¸²º߲½¤Îή¤ì¤äÂкö¸ú²̤ò¥ͥåȥ¥¯´Ķ¤Ⱦȹ礷¤ƳÎǧ¤Ǥ¤롥¤µ¤é¤ˡ¤¾õÂÖ°ܳÎΨ¤òÍѤ¤¤뤳¤Ȥǡ¤Ëܥâ¥ǥë¤ò¥٥¤¥¸¥¢¥ó¥ͥåȥ¥¯¤Ȥ·¤ư·¤¤¡¤¥ꥹ¥¯¸²º߲½¤θ¶°ø¤ο䬤¬²Äǽ¤Ȥʤ롥 |