Abstract

The information system consists of networks con- taining many entities. Furthermore, an information system is built into a part of infrastructure, and bears an important role. There- fore, the security countermeasures of the information system have been important subjects. In an information system, an adversary attacks an entity with a low security level. Therefore, the security level of all the entities should be unified into the common level. If it is under common directions of an administrative organization, the security level of each entity can be unified easily. However, in order that separate administrator may administer each entity, it is not easy to unify a security level. For example, in a Japanese E- government system, each ministry agency performs procurement and administration of their system. Therefore, the security level of each E-government system is not always the same. When each system is administered separately and it is more- over hard to commit legal force, in order to unify a security level, you have to recognize a mutual security level. In order to recognize a security level, evaluation and certification of a security system are important. Common Criteria is well known for evaluation and certification of the security level of a system. Common Criteria is the security criteria for evaluating whether from a viewpoint of information security, the product and system relevant to an information technology are designed appropriately and the design is implemented surely. It was recognized as ISO/IEC standards in June, 1999. However, in Common Criteria, the evaluation and certification of Cryptographic Module which are used with an information system have not been applicable. Cryptographic Module is functional block which offers the cryptographic function used with information systems and its security level needs to evaluate. It is necessary to perform evaluation of Cryptographic Module individually with Common Criteria evaluation. Security Requirements for Cryptographic Modules which used in Government agency is already defined as FIPS 140-2 in the U.S. and Canada. And they cooperate with the Validation scheme. The system which the U.S. and Canada are operating is premised on unitary control. However, in many E-government system of Japan, the vendor of Cryptographic Module and the vendor of a system are in same company. When the vendor of Cryptographic Module and a system is in common, the specification of Cryptographic Module is not released in many cases. Therefore, much time is required in order to build a system like the U.S. and Canada. Then, we did the case study about the conditions for building up Cryptographic Module Validation system smoothly under the situation like Japan. In this paper, we report that result.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.