{"title":"基于C语言的加密模块在Java中的应用及FIPS 140验证的保存","authors":"Hyunduk Choi, Okyeon Yi","doi":"10.1109/PLATCON.2015.31","DOIUrl":null,"url":null,"abstract":"Due to recent arise of cybercrime, importance of cyber security is highlighted more than ever. NIST has created Cryptographic Module Validation Program, namely CMVP, to validate security level of cryptographic modules for the United States Federal agencies: indeed, many are achieving the validation. According to the program, operating environments for any specific cryptographic module are fixed. In other words, running validated module in other software environment is strictly prohibited. However, this paper asserts that it is possible for a C based module to operate in Java environment without loss of validation as long as the module is running on a verified environment. We expect this paper to help saving great amount of time and costs for developing another cryptographic module for the same operating purpose.","PeriodicalId":220038,"journal":{"name":"2015 International Conference on Platform Technology and Service","volume":"300 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of C Based Cryptographic Module Operating in Java with Preservation of FIPS 140 Validation\",\"authors\":\"Hyunduk Choi, Okyeon Yi\",\"doi\":\"10.1109/PLATCON.2015.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to recent arise of cybercrime, importance of cyber security is highlighted more than ever. NIST has created Cryptographic Module Validation Program, namely CMVP, to validate security level of cryptographic modules for the United States Federal agencies: indeed, many are achieving the validation. According to the program, operating environments for any specific cryptographic module are fixed. In other words, running validated module in other software environment is strictly prohibited. However, this paper asserts that it is possible for a C based module to operate in Java environment without loss of validation as long as the module is running on a verified environment. We expect this paper to help saving great amount of time and costs for developing another cryptographic module for the same operating purpose.\",\"PeriodicalId\":220038,\"journal\":{\"name\":\"2015 International Conference on Platform Technology and Service\",\"volume\":\"300 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-01-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Platform Technology and Service\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PLATCON.2015.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Platform Technology and Service","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PLATCON.2015.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of C Based Cryptographic Module Operating in Java with Preservation of FIPS 140 Validation
Due to recent arise of cybercrime, importance of cyber security is highlighted more than ever. NIST has created Cryptographic Module Validation Program, namely CMVP, to validate security level of cryptographic modules for the United States Federal agencies: indeed, many are achieving the validation. According to the program, operating environments for any specific cryptographic module are fixed. In other words, running validated module in other software environment is strictly prohibited. However, this paper asserts that it is possible for a C based module to operate in Java environment without loss of validation as long as the module is running on a verified environment. We expect this paper to help saving great amount of time and costs for developing another cryptographic module for the same operating purpose.