安全标准来源PPT课件

上传人:M****1 文档编号:576226063 上传时间:2024-08-19 格式:PPT 页数:31 大小:378KB
返回 下载 相关 举报
安全标准来源PPT课件_第1页
第1页 / 共31页
安全标准来源PPT课件_第2页
第2页 / 共31页
安全标准来源PPT课件_第3页
第3页 / 共31页
安全标准来源PPT课件_第4页
第4页 / 共31页
安全标准来源PPT课件_第5页
第5页 / 共31页
点击查看更多>>
资源描述

《安全标准来源PPT课件》由会员分享,可在线阅读,更多相关《安全标准来源PPT课件(31页珍藏版)》请在金锄头文库上搜索。

1、安全协议与标准2009, 12安全标准与规范RFCISOFIPSX9PKCSP1363NESSIE安全标准 in RFC安全相关的协议与标准文件,当属RFC中的最全面。RFC中关于安全的文档涉及多个方面:By IETFIETF Security Area Working Groups btns Better-Than-Nothing Security dkim Domain Keys Identified Mail emu EAP Method Update hokey Handover Keying ipsecme IP Security Maintenance and Extensions

2、 isms Integrated Security Model for SNMP keyprov Provisioning of Symmetric Keys kitten Kitten (GSS-API Next Generation) krb-wg Kerberos ltans Long-Term Archive and Notary Services msec Multicast Security nea Network Endpoint Assessment pkix Public-Key Infrastructure (X.509) sasl Simple Authenticatio

3、n and Security Layer smime S/MIME Mail Security syslog Security Issues in Network Event Logging tls Transport Layer Security (0)安全综述,阐述了安全的概念、术语、需求,给出了一般化的考虑、建议和机制,如1675、2196、2323、2504、3631、4949等。(1)密码算法和协议/接口规范,比如RC2(2268)、MD5(1321)、PKCS/RSA(3447)、TLS(4346)、IKE(4306)、GSS-API、SASL等。(2)认证授权和访问控制规范,如R

4、ADIUS(2865)、Diameter(3588)、Kerberos、等。(3)应用规范,PGP(4880)、S/MIME、HTTP over TLS(2818)、IPSec、VPN、等。(4)其他规范。RFC:Internet 标准 (中译本)http:/ china-pubISOISO,关于OSI的安全需求(35.100.01)、服务和机制(iso7498),密码算法(35.040),安全管理(17799)等。ISO 7498-2 Security ArchitectureISO 10181 Security frameworks for open systemsISO 11586 Ge

5、neric upper layers securityhttp:/www.iso.org/FIPSFIPS,包括DES(46)、AES(197)、DSS(186)、HMAC(198)等;http:/csrc.nist.gov/publications/PubsFIPS.htmlFIPS-140FIPS 140是密码模块安全性需求最为重要的标准之一,也是业界衡量密码实现的准则。如果机构的信息或数据需要通过密码的方式进行保护,比如金融或者政府机构,那么FIPS 140-2标准则被适用。经过该标准符合性评估认证的产品模块将满足这些机构的密码系统技术要求,目前世界范围很多机构的IT产品采购和招标要求中

6、均提出了产品满足FIPS 140-2的需求。The FIPS 140 are series of publications numbered 140 which are a U.S. government computer security standards that specify requirements for cryptography modules. As of December 2006update, the current version of the standard is FIPS 140-2, issued on 25 May 2001. http:/www.itl.ni

7、st.gov/fipspubshttp:/csrc.nist.gov/groups/STM/cmvp/index.html http:/ 140标准历史和发展情况 CMVPThe Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to have their products

8、certified for use by the U.S. Government and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate sensitive, but not classfied information. All of the tests under the CMVP are handled by third-party laboratories that are accredite

9、d as Cryptographic Module Testing Laboratories by the National Voluntary Laboratory Accreditation Program (NVLAP). Product certifications under the CMVP are performed in accordance with the requirements of FIPS 140-2.The CMVP was established by the U.S. National Institute of Standards and Technology

10、 (NIST) and the Communications Security Establishment (CSE) of the Government of Canada in July 1995.Validated modules listValidated FIPS 140-1 and FIPS 140-2 Cryptographic Moduleshttp:/csrc.nist.gov/groups/STM/cmvp/validation.htmlhttp:/csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm Op

11、enSSL FIPS 140-2 modulehttp:/www.openssl.org/docs/fips/ 与通用评估准则(CC)的关系Common Criteria(CC)是业界安全功能和安全保障评估的通用准则,并实现了国际互认。而在美国NIAP体系下的CC产品评估,如果产品包括密码模块或者密码算法,该产品的CC认证证书上将标明该产品是否通过FIPS 140认证。事实上,CC和FIPS 140标准相辅相成,存在强烈的相关性,但关注点各有侧重。在FIPS 140验证中,如果操作环境是可以更改的,那么CC的操作系统需求适用于安全级别2或者更高。CC和FIPS 140-2标准分别关注产品测评的

12、不同层面。FIPS 140-2测评针对定义的密码模块,并提供4个级别的一系列符合性测评包。FIPS 140-2描述了密码模块的需求,包括物理安全、密钥管理、自评测、角色和服务等。该标准最初开发于1994年,早于CC标准。而CC是针对于具体的保护轮廓(PP)或者安全目标(ST)的评估。典型的模式是某个PP可能涉及广泛的产品范围。总之,CC评估不能替代FIPS 140的密码验证。FIPS 140-2中定义的四个安全级别也不能够直接与CC预定义的任何EAL级别或者CC功能需求相对应。CC认证不能取代FIPS 140的认证。X9ASC/ANSI X9,制定了一些关系金融领域安全的标准和规范。如随机数产

13、生(X9.17)、公钥算法服务于金融业(X9.63)等。http:/www.x9.org/standards/PKCSPKCS系列标准,RSA公司的标准。http:/ P1363,制定关于椭圆曲线密码算法等规范。http:/grouper.ieee.org/groups/1363/NESSIENESSIE,欧洲的密码新标准计划。The NESSIE project (New European Schemes for Signatures, Integrity and Encryption) (2000-2003) evaluates crypto algorithms.NESSIE has s

14、elected the following 12 algorithms from the 42 submissions; in addition, 5 well established standard algorithms have been added to the NESSIE portfolio (indicated with a *).https:/www.cosic.esat.kuleuven.be/nessie/Block ciphers: MISTY1: Mitsubishi Electric Corp., Japan; Camellia: Nippon Telegraph a

15、nd Telephone Corp., Japan and Mitsubishi Electric Corp., Japan; SHACAL-2: Gemplus, France; AES (Advanced Encryption Standard)* (USA FIPS 197) (Rijndael).Public-key encryption: ACE Encrypt: IBM Zurich Research Laboratory, Switzerland; PSEC-KEM: Nippon Telegraph and Telephone Corp., Japan; RSA-KEM* (d

16、raft of ISO/IEC 18033-2).MAC algorithms and hash functions: Two-Track-MAC: K.U.Leuven, Belgium and debis AG, Germany; UMAC: Intel Corp., USA, Univ. of Nevada at Reno, USA, IBM Research Laboratory, USA, Technion,Israel and Univ. of California at Davis, USA; CBC-MAC* (ISO/IEC 9797-1); HMAC* (ISO/IEC 9

17、797-1); Whirlpool: Scopus Tecnologia S.A., Brazil and K.U.Leuven, Belgium; SHA-256*, SHA-384* and SHA-512* (USA FIPS 180-2).Digital signature algorithms: ECDSA: Certicom Corp., USA and Certicom Corp., Canada; RSA-PSS: RSA Laboratories, USA; SFLASH: Schlumberger, France.Identification schemes: GPS: E

18、cole Normale Suprieure, Paris, France Tlcom and La Poste, France.SECGSECG,目前主要发布了一些关于ECC的规范。The Standards for Efficient Cryptography Group (SECG), an industry consortium, was founded in 1998 to develop commercial standards that facilitate the adoption of efficient cryptography and interoperability across a wide range of computing platforms. SECG members include leading technology companies and key industry players in the information security industry.http:/www.secg.org/Q & A

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号