On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module
|
|
|
|
Abstract: (1118 Views) |
The development of information and communication technology has led to the increasing production of new products in this field. One of the critical products protect informational assets at various levels of security in this field is cryptographic module. The security of cryptographic modules for providing a practical degree of protection against attacks should be examined totally. Therefore, the security evaluation of a cryptographic module requires a strong awareness of the potential weaknesses that would become security flaws, and careful consideration of security during all aspects of the evaluation process. In this paper, we present a comprehensive picture of the security evaluation criteria of the cryptographic module in accordance with existing international standards (e.g. FIPS 140-2 ,3 and ISO 15408, PKCS#11) and we propose the model based on fuzzy-weighted linear combination for measuring the compliance of these criteria correctly. Also, the structure of any kind of evaluation requires considerable cost and spends amount time, which on the one hand depends on the policies and requirements of the country and on the other hand depends on the facilities and experts. Finally, introducing and providing solutions that help solve the challenges, so we present some challenges about security evaluation in our country actually confirms the importance of study and research in this area. |
|
Keywords: Cryptographic Module, Evaluation Criteria, Fuzzy Hierarchical Analysis Process (FAHP), Weighted Linear Combination Model (WLC model), and Challenge |
|
Full-Text [PDF 2585 kb]
(528 Downloads)
|
Type of Study: Review Article |
Subject:
Special Received: 2022/04/3 | Accepted: 2023/06/6 | Published: 2023/07/8
|
|
|
|
|
Add your comments about this article |
|
|