NIST Information Technology Laboratory (ITL) The Cyber Maryland - - PowerPoint PPT Presentation

nist information technology laboratory itl the cyber
SMART_READER_LITE
LIVE PREVIEW

NIST Information Technology Laboratory (ITL) The Cyber Maryland - - PowerPoint PPT Presentation

NIST Information Technology Laboratory (ITL) The Cyber Maryland Showcase Cryptography Sign Hash Accuracy O r i g i n Key Encrypt Challenges Processing delays Concealment I nformation overhead Key Key Management overhead


slide-1
SLIDE 1

NIST Information Technology Laboratory (ITL) The Cyber Maryland Showcase

slide-2
SLIDE 2

Pg 2

Cryptography

Hash Encrypt Sign

Accuracy Concealment

O r i g i n

Key Key

Challenges Processing delays I nformation overhead Key Management overhead Compatibility Erosion of security Moore’s Law Processing efficiency (Quantum) Cryptanalysis

slide-3
SLIDE 3

Standards Process

Process Steps

I nformation Gathering Drafting NI ST Legal Review OMB Review Federal Register Notice Public Review Adjudication/ I ncorporation

  • f Public Comments

Documentation of Public Comments NI ST Legal Review Publication Decision OMB Review DOC Legal and Policy Reviews OMB Review Signature by Secretary of Commerce Federal Register Notice Publication by NI ST

Steps in Gold Print for All Publications Federal I nformation Processing Standards Only Note: Steps can be recursive.

Process for standards similar to rule making process followed by regulatory agencies. Information gathering includes prior art, workshop results, and conducting competitions. Conformant to Federal policies. Technical input from other state and local governments, Federal agencies (e.g., NSA), domestic and foreign industry, and academia.

slide-4
SLIDE 4

Implementation Concerns

Alter Cryptographic Hardware Alter Cryptographic Firmware Transponder in Reader Circuitry Transponder in Connector I ncorrect Algorithm I mplementation I nsecure Key Establishment Protocol Key Capture

Many ways to implement sound cryptographic algorithms incorrectly or in an insecure manner. Many cases of insecure implementations. Test and validation programs are needed to establish and maintain product assurance.

slide-5
SLIDE 5

Product Validation Programs

Standards-based test and evaluation by private sector (FI PS, I SO, etc.) Automated test tools National Voluntary Laboratory Accreditation Program (NVLAP) I nternational Laboratory Accreditation Cooperation (I LAC) - Reciprocity Government validation of laboratory reports (high-impact applications) > Cryptographic Algorithm Validation Program > NI ST Personal I dentity Verification Validation > Cryptographic Module Validation Program

  • Managed by U.S. (NI ST) and Canada (CSE)
  • U.S. and foreign laboratories accredited

U.S. U.K. Canada Japan Germany Taiwan

  • World-wide vendor set

Government requirements for validated products (e.g., U.S., Japan)

slide-6
SLIDE 6

NIST Partnerships

Foreign Organizations I nternational Standards Product Assurance Technical I nterchange National Security Organizations Standards Coordination Technical I nterchange/ Expertise Threat/ Vulnerability I nformation Research and Development Legislative Branch Laws and Policy Priorities Funding White House Policy Priorities Standards Coordination Federal Departments Standards Coordination Operational requirements Operational constraints Technical interchange I ndustry Standards Coordination Technical I nterchange I mplementation Opportunities I mplementation Constraints Operational Considerations Research and Development Academia Research Technical I nterchange Technical Expertise State & Local Governments Operational Requirements Operational Constraints Technical I nterchange

slide-7
SLIDE 7

Wm Curt Barker Computer Security Division Information Technology Laboratory wbarker@nist.gov 301-975-8443