[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 12, Issue 1 (9-2023) ::
منادی 2023, 12(1): 1-11 Back to browse issues page
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module
Abstract:   (1118 Views)
The development of information and communication technology has led to the increasing production of new products in this field. One of the critical products protect informational assets at various levels of security in this field is cryptographic module. The security of cryptographic modules for providing a practical degree of protection against attacks should be examined totally. Therefore, the security evaluation of a cryptographic module requires a strong awareness of the potential weaknesses that would become security flaws, and careful consideration of security during all aspects of the evaluation process. In this paper, we present a comprehensive picture of the security evaluation criteria of the cryptographic module in accordance with existing international standards (e.g. FIPS 140-2 ,3 and ISO 15408, PKCS#11) and we propose the model based on fuzzy-weighted linear combination for measuring the compliance of these criteria correctly. Also, the structure of any kind of evaluation requires considerable cost and spends amount time, which on the one hand depends on the policies and requirements of the country and on the other hand depends on the facilities and experts. Finally, introducing and providing solutions that help solve the challenges, so we present some challenges about security evaluation in our country actually confirms the importance of study and research in this area.
Keywords: Cryptographic Module, Evaluation Criteria, Fuzzy Hierarchical Analysis Process (FAHP), Weighted Linear Combination Model (WLC model), and Challenge
Full-Text [PDF 2585 kb]   (528 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2022/04/3 | Accepted: 2023/06/6 | Published: 2023/07/8
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module. منادی 2023; 12 (1) :1-11
URL: http://monadi.isc.org.ir/article-1-193-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 12, Issue 1 (9-2023) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 39 queries by YEKTAWEB 4660