Cryptonext安全使组织能够无缝地将其产品,系统和IT/OT基础架构从加密发现转变为加密网络安全,从而确保对量子威胁的长期弹性。它的解决方案还有助于预测并减轻密码随着时间的流逝。CryptoNext Security's offerings are segmented into three areas to support organizations in their transition to quantum-resilient cybersecurity: evaluation to measure the impact of PQC on applications and infrastructures while gaining expertise, inventory of cryptographic assets to set migration priorities and implement agile crypto management, and embedded solutions to integrate PQC into applications and systems.
Table 1 Abbreviations ................................................................................................................................................... 6 Table 2: TOE Security Functional Components .......................................................................................................... 14 Table 3: Assurance Components ................................................................................................................................. 20 Table 4: Windows 11 Platform .................................................................................................................................... 21 Table 5: Windows 11 CAVP Certificates .................................................................................................................... 21 Table 6: Windows 10 Platform .................................................................................................................................... 23 Table 7: Windows 10 CAVP Certificates .................................................................................................................... 23 Table 8: Persistent Credential Use and Storage ........................................................................................................... 25 Table 9 Permissions Required by the Hypori Halo Client ........................................................................................... 25 Table 10: SFR Protection Profile Sources ................................................................................................................... 32 Table 11 Security Functions vs.Requirements Mapping ............................................................................................ 33
答:NIAP 根据其发布的保护配置文件验证产品,这些配置文件将根据我们发布的过渡时间表开始包括抗量子签名。对于商业供应商,我们预计 NIAP 保护配置文件不会在评估目标 (TOE) 边界内执行签名生成,而只会执行签名验证。由于签名生成是需要状态管理的 LMS/XMSS 组件,因此如果仅执行签名验证,则此类产品仅需要 CAVP 验证(而非 CMVP)。
商业国家安全算法(CNSA)套件2.0。常见问题解答于2024年4月18日,星期四,NSA发布了有关其商业国家安全算法(CNSA)套件2.0的“常见问题-FAQ”。常见问题解答:https://media.defense.gov/2022/sep/07/2003071836/-1/1/1/1/csi_cnsa_2.0_faq_.pdf)。crypto4a完成了此新修订版和上一个版本的并排比较,并找到了以下添加/更改:问题:我可以继续使用较大尺寸的RSA或ECC来应对威胁吗?答案:No.RSA和椭圆曲线密码学是需要更换以实现量子电阻的主要算法。crypto4a:这是一个新主题,未包含在FAQ的先前版本中。问题:我可以在NIST SP 800-208中使用HSS或XMSSMT吗?答案:NSA在NIST SP 800-208中仅批准了在NSS中使用的LMS和XMS。不允许多级算法HSS和XMSSMT。crypto4a:这是一个新主题,未包含在FAQ的先前版本中。问题:我可以使用SLH-DSA(又称股份)+)签名软件吗?答案:虽然SLH-DSA基于哈希,但它不是CNSA的一部分,也不批准用于NSS中的任何用途。crypto4a:这是一个新主题,未包含在FAQ的先前版本中。问题:我将采用LMS或XMS进行软件/固件验证。需要验证哪些组件以及如何?如果我的硬件安全模块(HSM)未被验证,我可以豁免吗?预计可以从各种来源(签名者)收到签名的代码。答案:签名验证有望通过NIST的加密算法验证程序(CAVP)验证的代码执行。如果您的产品仅验证签名,则需要所有需要的CAVP测试。根据NIST SP 800-208,需要NSS的代码源(签名)(签名者),该签名需要由NIST的加密模块验证程序(CMVP)验证的硬件,或通过其他NSA指南进行验证。将不会为此授予豁免。虽然非NSS的代码源(签名)不受CNSA要求的约束,但预计它们将使用与经过验证的代码相同的开发和操作质量的代码,即可以通过CAVP测试的代码。注意:避免削弱这些签名的安全性,应该在硬件(例如HSM)中实施签名和状态管理。备份流可能涉及在模块之间传输密钥,必须防止状态重复使用。”
Table 8: Security Objectives for the TOE (PP_OS_V4.3) ............................................................. 13 Table 9: Security Objectives for the Operational Environment (PP_OS_V4.3) ............................ 14 Table 10: Security Objectives Rationale ....................................................................................... 14 Table 11: Summary of SFRs ......................................................................................................... 16 Table 12: SSH Auditable Events ................................................................................................... 19 Table 13: Management Functions ................................................................................................. 27 Table 14: Assurance Requirements ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...................................................................................................................................................................................... 46
该模块不在[140]之外实施缓解攻击缓解,因此[140]第4.11节缓解其他攻击不适用于[140ig] G.3 partial验证,而不是FIPS 140-2的适用区域。[140]第4.5节不适用于[140ig] 1.16,软件模块和[140ig] G.3的物理安全性。该模块符合[140ig] d.8关键协议方法x1.1:虽然[56a]提供了符合符合的方案和针对TLS和KDF使用的API输入点,但该模块并未提供SP800-135REV1或TLS中KDF的完整实现。在模块边界之外的TLS协议和KDF尚未由CAVP和CMVP审查或测试。模块设计对应于模块安全规则。由模块执行的安全规则在本文档的适当上下文中描述。
T ERM D ESCRIPTION ACM Adaptive Coding and Modulation AES Advanced Encryption Standard API Application Programming Interface ASIC Application Specific Integrated Circuit CAVP Cryptographic Algorithm Validation Program CMVP Cryptographic Module Validation Program CSP Critical Security Parameters CVL Component Validation List DAC Digital Access Card DRBG Deterministic Random Bit Generator DSA Digital Signature Algorithm ECCCDH Elliptic Curve Cryptography Cofactor Diffie-Hellman ECDSA Elliptic Curve DSA eM Electrical MUX FIPS Federal Information Processing Standard GUI Graphical User Interface HMAC Keyed-Hash Message Authentication Code INU Intelligent Node Unit IRU Indoor Radio Unit NCC Node Control Card NMS Network Management System NPC Node Protection Card ODU Outdoor Unit OS Operating System RAC Radio Access Card RSA An algorithm for public-key cryptography.首先以Rivest,Shamir和Adleman的名字命名。SHA安全哈希算法SNMP简单网络管理协议SP安全策略存储媒体任何媒体都需要以数据加密形式进行加密模块保护。存储媒体包括内部和外部硬盘驱动器,内存棒和软盘。TCP/IP传输控制协议/Internet协议TDM时线多路复用TLS传输层安全XPIC交叉极化干扰取消
7.1.1。s ecurity Audit生成(FAU_GEN.1,FAU_GEN.1/IPS,FAU_GEN.1/VPN,FAU_GEN.2,FPT_STM_EXT.1)S ECURITY AUDIT STORAGE (FAU_STG.1, FAU_STG_EXT.1, FAU_STG_EXT.4, FAU_STG_EXT.5) ...................... 66 7.1.3.c ryptography支持 - 密钥管理(FCS_CKM.1,fcs_ckm.1/ike,fcs_ckm.2,fcs_ckm.4,fcs_rbg_ext.1,fmt_mtd.1,fmt_mtd.1/c rypto k eys,fpt_skp_ext.1) 7.1.4。c ryptography支持 - 算法(fcs_cop.1/d ata e ncryption,fcs_cop.1/s ig g en,fcs_cop.1/h ash,fcs_cop.1/k eied h ash h ash).........................................................................................................c ryptography支持 - P折叠(FCS_HTTPS_EXT.1,FCS_IPSEC_EXT.1,FCS_NTP_EXT.1,FCS_TLSS_EXT.1,FCS_SSHS_EXT.EXT.EXT.1)C RYPTOGRAPHIC SUPPORT – S ELF TESTS (FPT_TST_EXT.1, FPT_TST_EXT.3, FPT_FLS.1/S ELF T EST ) .......................... 74 7.1.7.i牙列化和身份验证 - p Assword身份验证(FIA_AFL.1,FIA_UAU_EXT.1,FIA_UIA_EXT.1,FIA_PMG_EXT.1,FPT_APW_EXT.1,FPT_APW_EXT.1)i牙列化和身份验证 - VPN(FIA_X509_EXT.1/R EV,FIA_X509_EXT.2,FIA_X509_EXT.3)...... 77 7.1.9。s ecurity管理(fmt_mtd.1/core d ata,fmt_mof.1/f unctions,fmt_mof.1/s ervices,fmt_smf.1,fmt_smf.1,fmt_smf.1/vpn ................................................................................. 79 7.1.10。T RUSTED UPDATE (FPT_TUD_EXT.1, FMT_MOF.1/M ANUAL U PDATE ) ............................................................... 80 7.1.11.TOE ACCESS (FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1) ............................................................ 81 7.1.12.T RUSTED PATH / CHANNEL COMMUNICATIONS (FCO_CPC_EXT.1, FTP_ITC.1, FTP_ITC.1/VPN, FTP_TRP.1/A DMIN ) .................................................................................................................................................. 81 7.1.13.tateful流量过滤(FPF_RUL_EXT.1,FFW_RUL_EXT.1,FDP_RIP.2)..................................................................................................................................................................................................................................................................................................................................................................... 82 7.1.0。i nTrusion检测和预防(ips_abd_ext.1,ips_ipb_ext.1,ips_nta_ext.1,ips_sbd_ext.1)... 87 7.2。NIST CAVP CERTIFICATES ....................................................................................................................................... 91 7.3.C RITICAL SECURITY PARAMETERS ............................................................................................................................... 97 7.4.IP V 4和IP V 6传输层协议............................................................................................................................................................................................................................................................................................................................................................................................................. 99