earticle

논문검색

Authorization of Cryptographic Module in Operational Environments

초록

영어

A various types of cryptographic modules are utilized within a security system protecting sensitive information in computer and telecommunication systems. The approved authorities as like KCMVP, CMVP, JCMVP validate various types of cryptographic modules and assure the security of the module. When the cryptographic module is utilized in a diversity of application environments, it needs the professional technology to choice the cryptographic module which is proper to the application environments. Therefor if the information system owner acquires the cryptographic module to operate the information system safely, it is necessary to authorize the module through the authorization process. This paper proposes accreditation process to authorize cryptographic module when information system owner acquires a cryptographic module which was validated by the approved authority. The cryptographic module is claimed by ISO/IEC 19790 and ISO/IEC 247859. The authorization process and accreditation method which is proposed by this paper is useful when the system owner approves the cryptographic module to operate in the information system

목차

Abstract
 1. Introduction
 2. Validated Cryptographic Modules
 3. Authorization Process of Cryptographic Module
 4. Accreditation Method
 5. Conclusion
 Acknowledgements
 References

저자정보

  • Hee Bong Choi The Attached Institute of ETRI, Korea
  • Hyuk Joong Yoon The Attached Institute of ETRI, Korea
  • Haeng Seok Ko The Attached Institute of ETRI, Korea
  • Il Jun Kim The Attached Institute of ETRI, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.