<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6042572809285034351</id><updated>2026-03-24T08:45:25.002-05:00</updated><category term="common criteria"/><category term="CC"/><category term="fips 140-2"/><category term="atsec"/><category term="CCMC vision"/><category term="Fiona Pattinson"/><category term="CC scheme"/><category term="conferences"/><category term="CCRA"/><category term="computer security"/><category term="ICMC"/><category term="NIAP"/><category term="PCI"/><category term="cryptographic modules"/><category term="encryption"/><category term="CMVP"/><category term="ISO/IEC 27001"/><category term="Yi Mao"/><category term="embedded security"/><category term="pci dss"/><category term="security"/><category term="Andreas Fabis"/><category term="CCDB"/><category term="Helmut Kurth"/><category term="ISO"/><category term="ISO/IEC 15408"/><category term="IT security assurance"/><category term="assurance"/><category term="hardware"/><category term="supply chain"/><category term="27001"/><category term="Gerald Krummeck"/><category term="ICCC"/><category term="O-TTPS"/><category term="OTTF"/><category term="PP"/><category term="Payment Card Industry"/><category term="SCAP"/><category term="Sal la Pietra"/><category term="certification"/><category term="information security"/><category term="mainframe"/><category term="15408"/><category term="Auston Holt"/><category term="CAVP"/><category term="CCMC"/><category term="CCUF. CCDB"/><category term="CPP"/><category term="Cybersecurity framework"/><category term="FIPS 201"/><category term="FISMA"/><category term="FRITSA"/><category term="ISMS"/><category term="ISSA"/><category term="Jeremy Powell"/><category term="Ken Hake"/><category term="King Ables"/><category term="OCSI"/><category term="QSA"/><category term="Recognized Assessor"/><category term="Smartphone"/><category term="Staffan Persson"/><category term="Stephan Mueller"/><category term="Steve Weingart"/><category term="Trust"/><category term="apps"/><category term="cars"/><category term="compliance"/><category term="control systems"/><category term="evolution"/><category term="gsa fips 201"/><category term="npivp"/><category term="protection profiles"/><category term="social engineering"/><category term="technical communities"/><category term="trainings"/><category term="untrusted"/><category term="validation"/><category term="vulnerability"/><category term="3PAO"/><category term="AES"/><category term="April fool"/><category term="BSI"/><category term="BSides"/><category term="CISSP"/><category term="CSEC"/><category term="Courtney Cavness"/><category term="Criteria Labs"/><category term="David Ochel"/><category term="Dept of Commerce"/><category term="Dual EC DRBG"/><category term="EAL"/><category term="FedRAMP"/><category term="Federal Register"/><category term="GSA"/><category term="GSA FIPS 201 EP Information Day"/><category term="Heise"/><category term="ISC(2)"/><category term="IT"/><category term="IT assurance"/><category term="Intel"/><category term="Jayson Street"/><category term="KGB"/><category term="LCS"/><category term="Large Computing System"/><category term="Matthias Hofherr"/><category term="PA-DSS"/><category term="PIV"/><category term="Packages"/><category term="Progress"/><category term="Qualcomm"/><category term="RNG"/><category term="Rasma Mozuraite Araby"/><category term="SC 27"/><category term="SOGIS"/><category term="SP 800-90A"/><category term="Snapdragon"/><category term="Staffan Perrson"/><category term="SxSW. SxSWi"/><category term="TWIC"/><category term="Texas"/><category term="The Open Group"/><category term="Training"/><category term="Trusted Technology Provider"/><category term="Tutus"/><category term="US Government shutdown"/><category term="UT"/><category term="WG 3"/><category term="Yan Liu"/><category term="acsac"/><category term="acvp"/><category term="acvt"/><category term="agile"/><category term="atsec Rome"/><category term="atsec team"/><category term="automobile"/><category term="automotive"/><category term="autonomous"/><category term="career"/><category term="cell phone"/><category term="cellphone"/><category term="collaboration"/><category term="cryptographic algorithm"/><category term="cryptography"/><category term="customer"/><category term="developers"/><category term="doodle"/><category term="entropy"/><category term="evaluators"/><category term="hardening"/><category term="human rights"/><category term="hyperv"/><category term="hypervisor"/><category term="iTC"/><category term="independet security analysis"/><category term="information leakage"/><category term="international trade"/><category term="kvm"/><category term="marketing"/><category term="mentor"/><category term="mobile phone"/><category term="nist"/><category term="penentration testing"/><category term="physical security"/><category term="presentation penetration testing"/><category term="quality"/><category term="quality factors"/><category term="random"/><category term="re-use code"/><category term="routers"/><category term="rsa"/><category term="safety"/><category term="scrum"/><category term="security jobs"/><category term="side-channel"/><category term="software security"/><category term="string"/><category term="sweden"/><category term="teenagers"/><category term="testing"/><category term="tragedy"/><category term="value"/><category term="vehicle"/><category term="virtual machines"/><category term="vmware"/><category term="zSeries"/><category term="zombies"/><title type='text'>atsec IT security blog</title><subtitle type='html'>News about Common Criteria, cryptographic modules and other IT security topics</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Andreas</name><uri>http://www.blogger.com/profile/17368437730621711005</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBmtE0WKIn2IFdiMgstVJnV14YoYdNWHWK8iIVsPUzj8t3uhryiW5aGOWi4Mfhz7ByI478DFiGKnruOhUSIA1i1t-uDOZmbXR2YEVAzXaJMJoIqnHbnjaYJFlWmCs5mA/s220/sailor.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>309</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-8190676325662303084</id><published>2024-07-22T09:00:00.001-05:00</published><updated>2024-07-22T09:00:00.140-05:00</updated><title type='text'>Guiding the Way through the World of Cyber Security</title><content type='html'>&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;871&quot; height=&quot;382&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8YCdxe1CNyMwM1dYXTmmY4tiDDkvwY-G45xHmSTszLZ3iBJSTsXhq97aL3STr0Szs60amLt9fZ9MJkcmx8KTpozk6_1FAhLHzctK2XfMIQLM7NaOEB80WYC4wEnDWN9D_zUGZgU7Ub6nZ4boNzg53LDsEU0mya6Kg2nYOZTHfYu4s9HajDk6HiZscjUU/w640-h382/guiding_light_2.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;Roughly every five years, we refresh our website with a new appearance. As a precursor to our 25th anniversary in January 2025, we are thrilled to show the world our stylish, modern look.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;It is atsec’s firm belief that effective security assurance can only truly be accomplished when the product developers proactively incorporate security requirements they thoroughly understand. Thus, it is our responsibility to guide our customers through the complex and changing world of security standards so they can feel confident in their understanding.&lt;br /&gt;&lt;br /&gt;To that end, we refreshed our website with a new appearance to ensure it represents the current security standards landscape and that it is simple for anyone to navigate the relevant security requirements and find the services they need.&lt;br /&gt;&lt;br /&gt;As we launch this new version of our website, we wanted to take a moment to reflect on the changes in and the demands of the cyber security industry with a piece from one of our co-founders, Staffan Persson:&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;margin-left: 40px; text-align: left;&quot;&gt;The world of IT is constantly evolving, becoming more sophisticated, and covering more areas; cyber security is no exception. There are vanishingly few areas where cyber security is not crucial, as regulators usually demand some minimum level of security, and customers also increasingly understand how critical security is. We have all learned that cyber security is not entirely about features or functionality, it&#39;s about confidence in those security measures and their effectiveness; that confidence requires a set of criteria and an assessment showing that these criteria have been met.&lt;br /&gt;&lt;br /&gt;When we started atsec almost 25 years ago, security requirements were limited and focused on specific types of products and types of users, so it was a niche market for users and developers of high-security products. Although the security area was not mature yet, it was still relatively easy to discuss and understand security problems within such a small community. Still, it was also not a “cool” business to be in, so it remained small for quite some time. This has now completely changed.&lt;br /&gt;&lt;br /&gt;The current demand for security is huge: There are more security requirements than ever before, as well as different schemes to measure and certify security, both national and international. Sometimes, it is not even clear if a vendor has to comply with any security requirements, much less which specific requirements. In fact, the market is changing so fast that regulators also have a difficult time keeping up with these changes.&lt;br /&gt;&lt;br /&gt;Good security cannot be achieved by assessment alone, since such verification can only assess what&#39;s already there, provided by the vendor. For real improvements in security, it is essential that product developers understand and endorse security, including endorsing the security criteria they must comply with.&lt;br /&gt;&lt;br /&gt;Security criteria that have been available for decades have been updated, new aspects have been included, and - as confusing as they might be - it is important for vendors to understand these criteria. Clarity and transparency are an essential part of security, especially to the labs performing the security assessments, as they may be the first point of contact for vendors.&lt;br /&gt;&lt;br /&gt;Given the importance of clarity in a complicated space, atsec has modernized its web site to help lead by example:&lt;br /&gt;&lt;br /&gt;The website now comes with a modern design and covers all the services offered by every atsec office worldwide; this means no separate web site for each office.&lt;br /&gt;&lt;br /&gt;One main menu, structured by the various service groups, presents each of the specific services provided by our offices in a way that shall help our customers find the best combination for their individual needs.&lt;br /&gt;&lt;br /&gt;Along with each service, we also provide links where customers can download additional information, including authoritative links with references to the criteria and schemes. Informing our customers is of utmost importance to us, as we are convinced that customers who understand the criteria and their requirements can implement security profoundly better than those who are just impressed by some security expert witchcraft.&lt;br /&gt;&lt;br /&gt;This focus on the services, rather than their location, addresses the quite common situation where customers may need several types of assessment services that require the cooperation of multiple atsec offices. This co-operation between our offices to serve our international customers has been a hallmark of atsec’s business since its foundation, so it made sense to unify everything on a single website.&lt;br /&gt;&lt;br /&gt;We hope that this update will help you to better understand the different security criteria and whether they are useful for you. It may also be difficult to find out which security requirements are appropriate, what the requirement means, how big the effort will be, and who within atsec to talk to. If you need more information, just contact us for more information, as we’re always happy to help.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Please visit our new website at &lt;a href=&quot;http://www.atsec.com&quot;&gt;www.atsec.com&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/8190676325662303084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/07/guiding-way-through-world-of-cyber.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8190676325662303084'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8190676325662303084'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/07/guiding-way-through-world-of-cyber.html' title='Guiding the Way through the World of Cyber Security'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8YCdxe1CNyMwM1dYXTmmY4tiDDkvwY-G45xHmSTszLZ3iBJSTsXhq97aL3STr0Szs60amLt9fZ9MJkcmx8KTpozk6_1FAhLHzctK2XfMIQLM7NaOEB80WYC4wEnDWN9D_zUGZgU7Ub6nZ4boNzg53LDsEU0mya6Kg2nYOZTHfYu4s9HajDk6HiZscjUU/s72-w640-h382-c/guiding_light_2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-2162752047534683467</id><published>2024-07-12T19:25:00.005-05:00</published><updated>2024-07-12T20:07:12.446-05:00</updated><title type='text'>First SP800-140Br1 Compliant FIPS 140-3 Certificates</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7GI-DtWQePJfWH6cKK5qLRkBQ9byD7yzTvRzyP4br3BJKuA07GHHqRTOwJvwobYA2ggaIkfhXB8Gujt91pLNr0qe_blwuUyGwpSWBzzgPQbHVWGz21VzeX4S1-jLCAKIye993At5-grIASnmEDgBORv5BgZ7tZLVoexI2_OWtg87D3ztg-DH4bxPSN28/s624/pilot.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;320&quot; data-original-width=&quot;624&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7GI-DtWQePJfWH6cKK5qLRkBQ9byD7yzTvRzyP4br3BJKuA07GHHqRTOwJvwobYA2ggaIkfhXB8Gujt91pLNr0qe_blwuUyGwpSWBzzgPQbHVWGz21VzeX4S1-jLCAKIye993At5-grIASnmEDgBORv5BgZ7tZLVoexI2_OWtg87D3ztg-DH4bxPSN28/w487-h249/pilot.jpg&quot; width=&quot;487&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;On July 11&lt;sup&gt;th&lt;/sup&gt;, 2024, the first three FIPS 140-3
certificates for &lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/140/b/r1/final&quot;&gt;NIST’s
SP800-140Br1&lt;/a&gt; pilot program were posted on the NIST website. atsec
information security was one of the labs that took part in the pilot program.
SP 800-140Br1 specifies modifications of the methods to be used by a
Cryptographic and Security Testing Laboratory (CSTL) to demonstrate conformance
to ISO/IEC 19790 Annex B requirements.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The project was led by David Hawes (CMVP Program Manager)
who kicked off the project in June 2023 in preparation of the rollout of
SP800-140Br1 with the intention that it will benefit in preparing for the new
process. With regular group meetings and guidance form CMVP, atsec submitted
their first pilot in September 2023. This resulted in &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4723&quot;&gt;certificate
#4723&lt;/a&gt; for AMD’s ASP Cryptographic Coprocessor (&quot;Phoenix&quot;). atsec
would like to thank AMD for their willingness to be part of this project.
Special thanks to David Hawes for all the guidance, prompt response and his
dedication to this project. &lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;As an outcome of this project, CMVP created &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-module-validation-program/sp-800-140-series-supplemental-information/sp800-140b&quot;&gt;MIS
Verifier and Security Policy Builder&lt;/a&gt; tool which is an important step to
facilitate automated verification and processing of the modules. Security
Policy (SP) is one of the required documents for FIPS submission. Earlier the
SP was written manually in its entirety leading to many consistency and human
errors. In the new process, CMVP uses JSON as the submission format to provide
a mechanism for receiving structured data. This data in the form of field and
table information source is the Module Information Structure (MIS). The
remaining information is entered by the vendor into a copy of the CMVP supplied
Microsoft Word template document. This completed template is merged with the
MIS fields and tables to produce the final Security Policy. The verifier part,
parses the MIS fields and performs schema and &lt;a href=&quot;https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/Module%20Processes/ValidationRuleList-V2.0.0.pdf&quot;&gt;rule
validation&lt;/a&gt; that helps eliminate duplication of information and the need to
verify multiple separate sources.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;This is also accompanied with Br1 variation of the original &lt;a href=&quot;https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/Module%20Processes/Web-Cryptik_User_s_Guide_Br1_v1.0.pdf&quot;&gt;Web
Cryptik&lt;/a&gt;, a web-based application for the CSTLs to create and submit their FIPS
report packages to CMVP.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;This is not the only measure the CMVP is taking to shorten
cryptographic module queue: recently &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-module-validation-program&quot;&gt;Interim
Validations&lt;/a&gt; were introduced as a way to deal with the current backlog and
while it gives some much-needed relief, they come with a reduction in assurance
and a shorter certificate lifetime of 2 years vs. the usual 5 years.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;For a sustainable way to expedite the FIPS validation
process in response to the increasingly high demand for the validated
cryptographic modules, the &lt;a href=&quot;https://www.nccoe.nist.gov/sites/default/files/2023-06/cmvp-nist-sp-1800-40a-preliminary-draft.pdf&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: windowtext; text-decoration: none; text-underline: none;&quot;&gt;National Cybersecurity Center of Excellence&lt;/span&gt;&lt;/a&gt; (NCCoE) launched
the AMVP (Automated Module Validation Project) initiative and is making good
progress. The upcoming &lt;a href=&quot;https://icmconference.org/?page_id=21502&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: windowtext; text-decoration: none; text-underline: none;&quot;&gt;ICMC&lt;/span&gt;&lt;/a&gt; in September will have a Panel on this project and
demonstrate its latest development. atsec actively participates in the NCCoE
AMVP alongside the CMVP, vendors, and other labs. We are optimistic that we
will soon see the lights from the end of the lengthy review-pending tunnel. &lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;





&lt;style&gt;@font-face
	{font-family:&quot;Cambria Math&quot;;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face
	{font-family:Aptos;
	panose-1:2 11 0 4 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:536871559 3 0 0 415 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin:0in;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:&quot;Aptos&quot;,sans-serif;
	mso-ascii-font-family:Aptos;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:Aptos;
	mso-fareast-theme-font:minor-latin;
	mso-hansi-font-family:Aptos;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-bidi-theme-font:minor-bidi;
	mso-font-kerning:1.0pt;
	mso-ligatures:standardcontextual;
	mso-fareast-language:EN-US;}a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#467886;
	mso-themecolor:hyperlink;
	text-decoration:underline;
	text-underline:single;}a:visited, span.MsoHyperlinkFollowed
	{mso-style-noshow:yes;
	mso-style-priority:99;
	color:#96607D;
	mso-themecolor:followedhyperlink;
	text-decoration:underline;
	text-underline:single;}p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:&quot;Times New Roman&quot;,serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-US;}.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-family:&quot;Aptos&quot;,sans-serif;
	mso-ascii-font-family:Aptos;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:Aptos;
	mso-fareast-theme-font:minor-latin;
	mso-hansi-font-family:Aptos;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:EN-US;}div.WordSection1
	{page:WordSection1;}&lt;/style&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/2162752047534683467/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/07/first-sp800-140br1-compliant-fips-140-3.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2162752047534683467'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2162752047534683467'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/07/first-sp800-140br1-compliant-fips-140-3.html' title='First SP800-140Br1 Compliant FIPS 140-3 Certificates'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7GI-DtWQePJfWH6cKK5qLRkBQ9byD7yzTvRzyP4br3BJKuA07GHHqRTOwJvwobYA2ggaIkfhXB8Gujt91pLNr0qe_blwuUyGwpSWBzzgPQbHVWGz21VzeX4S1-jLCAKIye993At5-grIASnmEDgBORv5BgZ7tZLVoexI2_OWtg87D3ztg-DH4bxPSN28/s72-w487-h249-c/pilot.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-7940935338852120224</id><published>2024-06-14T13:02:00.002-05:00</published><updated>2024-06-14T13:02:37.481-05:00</updated><title type='text'>Changes Coming to NIAP Entropy Assessment Reports in 2025</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: courier; font-size: medium;&quot;&gt;&lt;i&gt;“What do you say to a room full of DRBGs standing around you? Everyone, please be seeded.” &lt;/i&gt;&lt;br /&gt;&amp;nbsp; -Quin, atsec tester&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When things change, it can help to approach that change with a light heart like this.&lt;br /&gt;&lt;/p&gt;Recently, NIAP announced that Entropy Assessment Reports (EARs) must include a NIST Entropy Source Validation (ESV) certificate starting at the turn of the year on January 1st, 2025. This change will be most felt by vendors using third-party entropy sources, as it will be necessary for those third-party entropy sources to have an ESV certificate that can be used in the EAR; for vendors using their own software or hardware entropy sources, comprehensive documentation will be required for the ESV assessment, along with more stringent testing.&lt;br /&gt;&lt;br /&gt;For the rest of the calendar year (CY24), EARs do not require an ESV certificate, and vendors using third-party entropy sources can provide clearly stated estimates of how much entropy their third-party solution provides. That said, getting a head start and going through an ESV assessment to get a certificate can help you prepare for both FIPS and NIAP CC evaluations, and can be used to strengthen your EAR for NIAP before the change goes into effect.&lt;br /&gt;&lt;br /&gt;If you’re uncertain how to approach these changes, we’re always available to answer questions via phone or email, and Quin and our other testers have already taken training to understand how to navigate the road ahead. Rest assured, we’ll approach it with a light heart.&lt;br /&gt;&lt;br /&gt;You can read NIAP’s announcement regarding the upcoming changes on their website in &lt;a href=&quot;https://niap-ccevs.org/Documents_and_Guidance/labgrams/labgram.cfm?id=118&quot; target=&quot;_blank&quot;&gt;Labgram #118/Valgram #137&lt;/a&gt;, and a more detailed overview of the changes is available in NIAP’s &lt;a href=&quot;https://www.niap-ccevs.org/MMO/GD/Entropy%20Documentation%20and%20Assessment%20Clarification.pdf&quot; target=&quot;_blank&quot;&gt;Clarification to the Entropy Documentation and Assessment Annex&lt;/a&gt; document.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/7940935338852120224/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/06/changes-coming-to-niap-entropy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7940935338852120224'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7940935338852120224'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/06/changes-coming-to-niap-entropy.html' title='Changes Coming to NIAP Entropy Assessment Reports in 2025'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-1401793735465779764</id><published>2024-06-07T09:56:00.000-05:00</published><updated>2024-06-07T09:56:00.927-05:00</updated><title type='text'>BSI NESAS CCS-GI Scheme Updates</title><content type='html'>&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPGd375_OYk5aknIprbxi9auTooMDa1O8hqGPLX58pMKJEOvN2EJSorg6hQhY9EeorCYbiysBOxwKSmmqFuUjfBrnWKd5Nk-Y7MYduCeabslMjFsk1rsjBFDuUYk1o_ppcAdT4R-_6nFyk7-IAYlTmCJocOlaTrS8FfQUcoNaGASVhm3_LwOwv_-WvL3o/s533/Pruefstelle_IT-Sicherheit_engl.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;528&quot; data-original-width=&quot;533&quot; height=&quot;317&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPGd375_OYk5aknIprbxi9auTooMDa1O8hqGPLX58pMKJEOvN2EJSorg6hQhY9EeorCYbiysBOxwKSmmqFuUjfBrnWKd5Nk-Y7MYduCeabslMjFsk1rsjBFDuUYk1o_ppcAdT4R-_6nFyk7-IAYlTmCJocOlaTrS8FfQUcoNaGASVhm3_LwOwv_-WvL3o/s320/Pruefstelle_IT-Sicherheit_engl.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We&#39;d like to inform our customers and partners that the German Federal Office for Information Security (BSI) recently published new documents approving the use of additional Security Assurance Specifications (SCAS) under the BSI 5G NESAS Certification and Evaluation Scheme (BSI NESAS CCS-GI).&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;We encourage our customers to fully review the newly published documents and explore how these additional approved SCAS might be useful in achieveing NESAS CCS-GI certification. The full update can be found on BSI’s website for NESAS CCS-GI (&lt;a href=&quot;https://www.bsi.bund.de/dok/NESAS-Dokumente&quot;&gt;https://www.bsi.bund.de/dok/NESAS-Dokumente&lt;/a&gt;); for a quick summary, the following SCAS have now been approved:&lt;/div&gt;&lt;div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;TS 33.523 18.2.0&lt;/li&gt;&lt;li&gt;TS 33.526 18.1.0&lt;/li&gt;&lt;li&gt;TS 33.527 18.2.0&lt;/li&gt;&lt;li&gt;TS 33.528 18.0.0&lt;/li&gt;&lt;li&gt;TS 33.537 18.2.0&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Note that, while BSI have not made any changes to the above SCAS, the refinements for TS 33.117 (as described in the &lt;a href=&quot;https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Certification/NESAS-CCS-GI/Anwendungshinweise_Interpretationen/AIS_N2.pdf?__blob=publicationFile&amp;amp;v=10&quot; target=&quot;_blank&quot;&gt;AIS N2&lt;/a&gt; document) are still applicable for SCAS that refer to TS 33.117, such as TS 33.526.&lt;br /&gt;&lt;br /&gt;As always, our team is ready to assist with any questions or provide guidance regarding this update.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Get in Touch&lt;/b&gt;&lt;br /&gt;For more information on the newly approved SCAS and how they relate to your product lines, please don&#39;t hesitate to reach out to us. These services are provided by atsec via the German office.&lt;br /&gt;&lt;br /&gt;Email: &lt;a href=&quot;mailto:info@atsec.com&quot;&gt;info@atsec.com&lt;/a&gt;&lt;br /&gt;Phone: +49-89-442-49-830&lt;br /&gt;Website: &lt;a href=&quot;http://www.atsec.com&quot;&gt;www.atsec.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Stay tuned for more updates as we continue to bring you the latest within 5G security evaluation and certification.&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/1401793735465779764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/06/bsi-nesas-ccs-gi-scheme-updates.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/1401793735465779764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/1401793735465779764'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/06/bsi-nesas-ccs-gi-scheme-updates.html' title='BSI NESAS CCS-GI Scheme Updates'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPGd375_OYk5aknIprbxi9auTooMDa1O8hqGPLX58pMKJEOvN2EJSorg6hQhY9EeorCYbiysBOxwKSmmqFuUjfBrnWKd5Nk-Y7MYduCeabslMjFsk1rsjBFDuUYk1o_ppcAdT4R-_6nFyk7-IAYlTmCJocOlaTrS8FfQUcoNaGASVhm3_LwOwv_-WvL3o/s72-c/Pruefstelle_IT-Sicherheit_engl.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-7332209431658540503</id><published>2024-04-23T09:47:00.007-05:00</published><updated>2024-04-23T10:35:50.956-05:00</updated><title type='text'>EUCC and  Cybersecurity Certification in Europe</title><content type='html'>&lt;img border=&quot;0&quot; data-original-height=&quot;186&quot; data-original-width=&quot;451&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR5sFrRxYdXlz4krhdAzsuSIYtILamTRSPcNHTCGBN0Qul8A0td0qtX-NeJ7H4vRP4_AuhIZOob-8zEF7YfirIHx1WuPB8JgOAvm77y9zzrFd9XhB1LXbQNeFPW7UC5nZnE0a5vYvr5b5TlQ-iB_lIHTGF_kl_500KwMy_n8K7omielymxZEu6TAj_klE/w640-h264/eucc.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;br /&gt;The European Union Agency for Cybersecurity (ENISA) hosted a &lt;a href=&quot;https://www.enisa.europa.eu/events/2024-cybersecurity-certification-conference/certification-conference-agenda&quot; target=&quot;_blank&quot;&gt;cybersecurity certification conference&lt;/a&gt; on April 18, 2024, in Brussels, Belgium. The conference very much focused on the implementation of the EUCC - European Cybersecurity Certification Scheme. This scheme, based on the established Common Criteria (CC), aims to harmonize cybersecurity assessments for Information and Communication Technology (ICT) products in Europe.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Transitioning phase&lt;/b&gt;&lt;br /&gt;While the EUCC officially launched in February 2024, a transition period is in place to ensure a smooth shift from existing national schemes. Here&#39;s a breakdown of what to expect:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;2024:&lt;/b&gt; This year serves as a grace period for national certifications. Existing certificates issued under national schemes remain valid until their expiration date. &lt;/li&gt;&lt;li&gt;&lt;b&gt;2025 and beyond:&lt;/b&gt; It&#39;s anticipated that by 2025, the EUCC will become the dominant certification scheme across Europe. National schemes are expected to be phased out completely, making the EUCC the sole gateway for cybersecurity certification within the EU.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;A Look Ahead: Embracing the EUCC&lt;/b&gt;&lt;br /&gt;The EUCC signifies a positive step towards a more robust cybersecurity environment in Europe. As we move into the latter half of 2024 and beyond, here&#39;s what to keep in mind:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;National Cybersecurity Certification Authorities (NCCAs) and Conformity Assessment Bodies (CABs):&lt;/b&gt; Establish the necessary certification structure; achieve required authorizations and accreditation.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Manufacturers:&lt;/b&gt; Familiarize yourself with the EUCC requirements and consider initiating the certification process for your products. Also, consider post-certification vulnerability handling requirements that will be enforced by the EUCC.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Consumers:&lt;/b&gt; Look for the EUCC mark when purchasing ICT products and cloud services, signifying their adherence to a rigorous cybersecurity standard.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Market uptake&lt;/b&gt;&lt;br /&gt;Predicting the exact pace of market uptake of the EUCC is difficult, but global certificate recognition, well defined and streamlined certification processes would make the scheme attractive to the manufacturers of the ICT products. The future of the EUCC might also be impacted by broader European cybersecurity regulations that could potentially mandate the use of the scheme for certain types of products.&lt;br /&gt;Rasma Araby, from atsec information security, participated in the panel discussion “How to handle vulnerabilities in certified solutions,” discussing vulnerability management and disclosure procedures compliance with the obligations outlined in the EUCC.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;What can atsec do for you?&lt;/b&gt;&lt;br /&gt;Since the start of the ENISA initiative in 2018, we have been actively contributing to the EUCC development. We regularly inform our customers of the progress to help them benefit from EUCC certification.&amp;nbsp; &lt;br /&gt;If you are interested in performing EUCC certification or have questions regarding our evaluation services, please do not hesitate to contact us (&lt;a href=&quot;mailto:info@atsec.com&quot;&gt;info@atsec.com&lt;/a&gt;). We look forward to working with you.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/7332209431658540503/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/eucc-and-cybersecurity-certification-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7332209431658540503'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7332209431658540503'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/eucc-and-cybersecurity-certification-in.html' title='EUCC and  Cybersecurity Certification in Europe'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR5sFrRxYdXlz4krhdAzsuSIYtILamTRSPcNHTCGBN0Qul8A0td0qtX-NeJ7H4vRP4_AuhIZOob-8zEF7YfirIHx1WuPB8JgOAvm77y9zzrFd9XhB1LXbQNeFPW7UC5nZnE0a5vYvr5b5TlQ-iB_lIHTGF_kl_500KwMy_n8K7omielymxZEu6TAj_klE/s72-w640-h264-c/eucc.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-8109619698709794079</id><published>2024-04-10T09:34:00.011-05:00</published><updated>2024-04-11T13:08:01.515-05:00</updated><title type='text'>atsec Adds FIDO Evaluation Qualification</title><content type='html'>&lt;img border=&quot;0&quot; data-original-height=&quot;220&quot; data-original-width=&quot;556&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXzsIxdSxV-WizkmZR157TEe4_juQTTxh71tkIQrTMz1PYubTW7D4h9KbCQ0cuTtKpc0i8hYkwRRpKwMAY_0GnzeI8DBO4e4EI4LhT8-2ddtVHPjAZi-oGZQOTEtXKSn-31pYeOozhfXVWsvGLncblufTC9YZRJ9BG3tDOLb76vWf9mKsDoOrDJzQWav0/w640-h254/fido.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;br /&gt;atsec information security (branded as “atsec”) has been qualified by the FIDO Alliance as one of the FIDO Accredited Security Laboratories to evaluate the authenticator products. The accreditation has been listed on the official website of the FIDO Alliance: &lt;a href=&quot;https://fidoalliance.org/certification/authenticator-certification-levels/accredited-security-laboratories/&quot; target=&quot;_blank&quot;&gt;https://fidoalliance.org/certification/authenticator-certification-levels/accredited-security-laboratories/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In addition, atsec is also one of the FIDO members (&lt;a href=&quot;https://fidoalliance.org/members/&quot; target=&quot;_blank&quot;&gt;https://fidoalliance.org/members/&lt;/a&gt;) and contributes to the industry.&lt;br /&gt;&lt;br /&gt;Passwords are the root cause of over 80% of data breaches, making them the main problem of cybersecurity. With the average user having more than 90 online accounts, up to 51% of passwords are reused across those accounts. According to the research of FIDO Alliance, the average help desk labor cost for a single password reset is up to $70.&lt;br /&gt;&lt;br /&gt;FIDO, short for “Fast IDentity Online”, is a series of authentication standards that help reduce reliance on passwords. As an accredited security laboratory by the FIDO Alliance,. atsec information security offers the following security evaluation services for your authenticator products:&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;FIDO2: FIDO2 is comprised of the W3C Web Authentication (WebAuthn) and corresponding Client-to-Authenticator Protocols (CTAP) from the FIDO Alliance.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;WebAuthn: WebAuthn defines a standard web API that is being built into browsers and platforms to enable support for FIDO Authentication.&lt;/li&gt;&lt;li&gt;CTAP2: CTAP2 allows the use of external authenticators (FIDO Security Keys, mobile devices) for authentication on FIDO2-enabled browsers and operating systems over USB, NFC, or BLE for a passwordless, second-factor or multi-factor authentication experience.&lt;/li&gt;&lt;li&gt;CTAP1: Formerly known as “FIDO U2F”, CTAP1 allows the use of existing FIDO U2F devices (such as FIDO Security Keys) for authentication on FIDO2-enabled browsers and operating systems over USB, NFC, or BLE for a second-factor experience.&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;FIDO UAF: FIDO UAF supports a passwordless experience for online service on users’ own device with local authentication mechanisms such as swiping a finger, looking at the camera, speaking into the mic, entering a PIN, etc.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The FIDO2 and FIDO UAF protocols have been identified within the common specification authenticator security goals. There are 16 Security Goals (SG) identified by FIDO, and 29 Security Measures (SM) that can be implemented to cover the security goals for FIDO authenticators. Ten Security Requirements are derived to support the Security Measures:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Authenticator definition Derived Requirements&lt;/li&gt;&lt;li&gt;Key Management and Authenticator Security Parameters&lt;/li&gt;&lt;li&gt;Authenticator’s Test for User Presence and User Verification&lt;/li&gt;&lt;li&gt;Privacy&lt;/li&gt;&lt;li&gt;Physical Security, Side Channel Attack Resistance and Fault Injection Resistance&lt;/li&gt;&lt;li&gt;Attestation&lt;/li&gt;&lt;li&gt;Operating Environment&lt;/li&gt;&lt;li&gt;Self-Tests and Firmware Updates&lt;/li&gt;&lt;li&gt;Manufacturing and Development&lt;/li&gt;&lt;li&gt;Operational Guidance&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Passwords and other forms of legacy authentication, such as SMS OTPs, are knowledge-based, a hassle to remember, and easy to phish, harvest, and replay. FIDO helps shift from this legacy, knowledge-based authentication scenario to a modern, possession-based and phishing-resistant authentication scenario.&lt;br /&gt;&lt;br /&gt;The security testing of the authenticator products against FIDO standards allows vendors to integrate their authenticators into modern and FIDO-enabled online services and provides their users with a flawless authentication experience. This also reduces the risk of a password being forgotten or stolen.&lt;br /&gt;&lt;br /&gt;atsec is ready to partner with you to help you understand the requirements of the standard, test your authenticator products, and achieve the FIDO certification.&lt;br /&gt;&lt;br /&gt;The products being compliant with the FIDO UAF, FIDO U2F, and FIDO2 specifications and evaluated by a security laboratory (e.g. atsec) can be certified and listed by FIDO alliance on the official website: &lt;a href=&quot;https://fidoalliance.org/certification/fido-certified-products/&quot;&gt;https://fidoalliance.org/certification/fido-certified-products/&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;For more information about atsec, please visit: &lt;a href=&quot;https://www.atsec.com&quot;&gt;https://www.atsec.com&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/8109619698709794079/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/atsec-adds-fido-evaluation-qualification.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8109619698709794079'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8109619698709794079'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/atsec-adds-fido-evaluation-qualification.html' title='atsec Adds FIDO Evaluation Qualification'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXzsIxdSxV-WizkmZR157TEe4_juQTTxh71tkIQrTMz1PYubTW7D4h9KbCQ0cuTtKpc0i8hYkwRRpKwMAY_0GnzeI8DBO4e4EI4LhT8-2ddtVHPjAZi-oGZQOTEtXKSn-31pYeOozhfXVWsvGLncblufTC9YZRJ9BG3tDOLb76vWf9mKsDoOrDJzQWav0/s72-w640-h254-c/fido.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-2823208841664212910</id><published>2024-04-01T13:12:00.034-05:00</published><updated>2024-04-03T11:35:24.200-05:00</updated><title type='text'>atsec AB first IEEE 2621 Accredited Medical Device Testing Facility</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-4ygWIbf2YNglelYGO-XHqw2_FOzOGxlVMNfVExEvVM6COMMqwGhfjnZgcB6Hk4L_torT_c3ETiJX8B2zuG1d-pBpM3bCL0A7SXQyZSFyeQ5FLKRsHblPNmsL92vs4LTG8mq1tFkqW1Kaq5UsX9f9QdyZPFdoPEW82LG4Y2Z5dSSEhu7qqnkoemGgL0/s430/md_logo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;95&quot; data-original-width=&quot;430&quot; height=&quot;89&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-4ygWIbf2YNglelYGO-XHqw2_FOzOGxlVMNfVExEvVM6COMMqwGhfjnZgcB6Hk4L_torT_c3ETiJX8B2zuG1d-pBpM3bCL0A7SXQyZSFyeQ5FLKRsHblPNmsL92vs4LTG8mq1tFkqW1Kaq5UsX9f9QdyZPFdoPEW82LG4Y2Z5dSSEhu7qqnkoemGgL0/w400-h89/md_logo.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;atsec AB Stockholm, Sweden is thrilled to announce:&amp;nbsp; We are the first IEEE Authorized Testing Facility!&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;We&#39;ve officially been &lt;a href=&quot;https://standards.ieee.org/products-programs/icap/programs/medical-devices-cybersecurity/#test-labs&quot; target=&quot;_blank&quot;&gt;approved as an IEEE Authorized Testing Facility&lt;/a&gt;, making atsec AB Stockholm, Sweden the first company able to provide testing of medical devices according to the IEEE 2621 standard. Additional locations include atsec corporation Austin TX, USA and atsec GmbH Munich, Germany.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;616&quot; data-original-width=&quot;1311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpskBG8sXu-2_S44_L8HhGZ-uVwIUtuHZCU7SDS2ddTP-qE3ND_ysUmdN38VbW1Uqims95_OvauLSTDNzVbrG17kbL6WKe9XmP69-cR_AmI1_I1pebzY4Lw-4J2OpIjJnuHKIjJyoK-K9TLVK2z3qm57LrZPOv7JkXh8Wr4SvXQ4mGQzIR4hLTpkSKP1ph/w640-h301/Screenshot%202024-04-02%20at%209.46.26%E2%80%AFAM.png&quot; width=&quot;620&quot; /&gt;&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;The IEEE, or Institute of Electrical and Electronics Engineers, is a globally recognized leader in developing technical standards. Earning their authorization as a testing facility demonstrates our capability to conduct rigorous and reliable security evaluations of medical devices according to the IEEE 2621 standard.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-LmzNs-MMbtMvKXx6cx3uJlNcY5_dYK1ZyFroKy6ntVEbjofppFBdHqsKExeOm8ZU7ti-y3nv92orl8s3GLsKUU5nYdjIoXZeYC5te-KVwDjNDMZ-OS3Tl7RzSV1YGJWpnmnQxkw1pRifqWCT3kB4rvE-_MI73irabpV87EtxE9cE5QrWMkkyfMt0MzY/s965/md_cert.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;739&quot; data-original-width=&quot;965&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-LmzNs-MMbtMvKXx6cx3uJlNcY5_dYK1ZyFroKy6ntVEbjofppFBdHqsKExeOm8ZU7ti-y3nv92orl8s3GLsKUU5nYdjIoXZeYC5te-KVwDjNDMZ-OS3Tl7RzSV1YGJWpnmnQxkw1pRifqWCT3kB4rvE-_MI73irabpV87EtxE9cE5QrWMkkyfMt0MzY/w400-h306/md_cert.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Importantly, the IEEE 2621 standard is recognized by the Food and Drug Administration (FDA), the leading regulatory body for medical devices in the United States. This recognition signifies that the FDA considers the standard to be a valuable tool in ensuring medical device security.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcdHvkfWjRzCu2ZZyAli_BW7a9vGdDpprSdwAfI3uXqokRh0PSP4ol7h-03Ca9aLNQmoNqZUdXz1dPh6r9aowqPAbuZt2yUa-hYub3Q0e4z_hITOfByFIssBmUizSvNimdl1-rp-vCT-YZ5SC06rL-xJgUZHWZm3nMuniNWMP8P4wLx_EFGDD2ZvzkHMQ/s643/md_ieee.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;358&quot; data-original-width=&quot;643&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcdHvkfWjRzCu2ZZyAli_BW7a9vGdDpprSdwAfI3uXqokRh0PSP4ol7h-03Ca9aLNQmoNqZUdXz1dPh6r9aowqPAbuZt2yUa-hYub3Q0e4z_hITOfByFIssBmUizSvNimdl1-rp-vCT-YZ5SC06rL-xJgUZHWZm3nMuniNWMP8P4wLx_EFGDD2ZvzkHMQ/w400-h223/md_ieee.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Proven Expertise Through Pilot Projects&lt;/b&gt;&lt;br /&gt;&quot;We enthusiastically embraced the opportunity to become a player in this domain when IEEE first contacted atsec in July 2022,&quot; said Sal La Pietra, President and founder of atsec.&lt;br /&gt;We&#39;re particularly proud of this achievement because it follows the successful completion of two pilot projects that used the IEEE 2621 standard for medical device testing. These projects allowed us to refine our processes and demonstrate our expertise in applying this standard,&quot; added Rasma Mozuraite Araby, Managing Director of atsec AB in Stockholm, Sweden. &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;Looking Ahead: Medical Device Testing&lt;/b&gt;&lt;br /&gt;As an IEEE Authorized Testing Facility with laboratories in Sweden, the U.S., and Germany, atsec is now positioned to offer our clients a suite of testing services that ensure their medical devices meet the industry&#39;s security benchmarks. If you&#39;re looking for a reliable partner to verify the security of your medical devices, &lt;a href=&quot;https://www.atsec.com/global-addresses/index.html&quot; target=&quot;_blank&quot;&gt;contact us today&lt;/a&gt; to discuss your specific needs.&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/2823208841664212910/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/atsec-ab-stockholm-sweden-is-thrilled.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2823208841664212910'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2823208841664212910'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/atsec-ab-stockholm-sweden-is-thrilled.html' title='atsec AB first IEEE 2621 Accredited Medical Device Testing Facility'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-4ygWIbf2YNglelYGO-XHqw2_FOzOGxlVMNfVExEvVM6COMMqwGhfjnZgcB6Hk4L_torT_c3ETiJX8B2zuG1d-pBpM3bCL0A7SXQyZSFyeQ5FLKRsHblPNmsL92vs4LTG8mq1tFkqW1Kaq5UsX9f9QdyZPFdoPEW82LG4Y2Z5dSSEhu7qqnkoemGgL0/s72-w400-h89-c/md_logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-6546510990703241874</id><published>2024-04-01T00:44:00.000-05:00</published><updated>2024-04-01T00:44:51.317-05:00</updated><title type='text'> BREAKING NEWS: c@tsec information security Unveils Revolutionary Quantum Computer</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;200&quot; data-original-width=&quot;894&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRhQKry8nolcIDXxaERfRUNwHo-77bMnTUa6nFYqOGgWOXKSxqY-DjniGK9LDsaS8Wtlc_9gEQyJFvnkhQPKQbcsVyDufSPE_QJG0Z6qSEc3odYl3b9N456rZc_F7F2wdBaK7agwZFoNgnlWNlPwWH3BTW2Y_2WDSUoBPlzUrAPuA24-iiQQylUuzZpVs/w640-h144/Screenshot%202024-03-20%20at%201.56.20%E2%80%AFPM.png&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;April 1, 2024 – Austin, TX&lt;/b&gt;: In a groundbreaking announcement today, c@tsec information security, a subsidiary of atsec information security, and the leader in quantum computing technology, proudly unveils its latest innovation: the Quantum PurrProcessor™.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheRWjB-FZ-a42AXtHSABDxLFLOpSq4_0JoGmPtdqXiyo131Suu5X1Zmy2L02zsd1-yzm7eV3LmZukq7lCSXbfd6E9CwP8H7JgEbV-p3k3UVUP8fUW4iCQglOv7KIX332gsPssVICJZGQpBVPJ-pWFxoZ1b9LzLiw-RAgPKaedmoWsbSW0I1eQsP4Qx1Cc/s179/Picture2.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;179&quot; data-original-width=&quot;179&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheRWjB-FZ-a42AXtHSABDxLFLOpSq4_0JoGmPtdqXiyo131Suu5X1Zmy2L02zsd1-yzm7eV3LmZukq7lCSXbfd6E9CwP8H7JgEbV-p3k3UVUP8fUW4iCQglOv7KIX332gsPssVICJZGQpBVPJ-pWFxoZ1b9LzLiw-RAgPKaedmoWsbSW0I1eQsP4Qx1Cc/w224-h224/Picture2.png&quot; width=&quot;224&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The Quantum PurrProcessor™ operates on a revolutionary principle, harnessing the power of Schrödinger&#39;s Cat to perform computations beyond the limitations of classical computers. By forming a matrix of 1024 by 1024 cardboard boxes, each containing a Schroedinger’s cat either alive or dead, we achieve a never before seen computing power of 1024&lt;sup&gt;2&lt;/sup&gt; CuteBits.&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&quot;We are ecstatic to introduce the world to our feline-fueled quantum computing marvel,&quot; said Stephan Mueller, Principal Consultant and Chief Feline Officer at c@tsec. &quot;Our approach not only pushes the boundaries of quantum mechanics but also provides a cozy home for these quantum kitties.&quot;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;However, due to strict animal welfare regulations, c@tsec’s scientists had to make a few adjustments. Instead of furry felines who could be either alive or dead, our boxes are now filled with state-of-the-art RoboCats™ driven by the newest generation of AI, thus merging several cutting-edge technologies.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&quot;Our RoboCats™ are programmed with the indecision of a real cat and the computational prowess of a quantum physicist,&quot; said Mueller. &quot;And they don&#39;t shed – a win-win for both computing efficiency and office cleanliness!&quot;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Once more atsec information security proves to the world that easy solutions to difficult problems are possible. The Quantum PurrProcessor™ will be available for purchase in the near future. Maybe 5 years from now. Or on April 1st 2025.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/6546510990703241874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/breaking-news-ctsec-information.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6546510990703241874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6546510990703241874'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/04/breaking-news-ctsec-information.html' title=' BREAKING NEWS: c@tsec information security Unveils Revolutionary Quantum Computer'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRhQKry8nolcIDXxaERfRUNwHo-77bMnTUa6nFYqOGgWOXKSxqY-DjniGK9LDsaS8Wtlc_9gEQyJFvnkhQPKQbcsVyDufSPE_QJG0Z6qSEc3odYl3b9N456rZc_F7F2wdBaK7agwZFoNgnlWNlPwWH3BTW2Y_2WDSUoBPlzUrAPuA24-iiQQylUuzZpVs/s72-w640-h144-c/Screenshot%202024-03-20%20at%201.56.20%E2%80%AFPM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-6494695554079232735</id><published>2024-03-27T12:02:00.001-05:00</published><updated>2024-03-27T12:04:16.201-05:00</updated><title type='text'>XDRGB - Random Bit Generator using any XOF</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAq4eGSCH5Tq9EuOzCKe8pF9aI-IqEgmkjxRMFL3qRMN1OfyCQPTzdBWKGLDApJ0jjqtTo0x2jXXM9Y9rHYo_DuLbY_W__4I96h_djMCEGK8wY8eYOQBdpeJw8CY9S_n5lYRzV43WSDrA66hsMcZGAuHoWAgcrDmZdLz4Me41hxLSsGzFIYAl5nE9KP4/s620/xof.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;620&quot; height=&quot;279&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAq4eGSCH5Tq9EuOzCKe8pF9aI-IqEgmkjxRMFL3qRMN1OfyCQPTzdBWKGLDApJ0jjqtTo0x2jXXM9Y9rHYo_DuLbY_W__4I96h_djMCEGK8wY8eYOQBdpeJw8CY9S_n5lYRzV43WSDrA66hsMcZGAuHoWAgcrDmZdLz4Me41hxLSsGzFIYAl5nE9KP4/s320/xof.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Resulting from a joint collaboration between John Kelsey (NIST), Stefan Lucks (Bauhaus-Universität Weimar, Germany) and Stephan Müller (atsec information security), a new deterministic random bit generator (DRBG) is published. The XDRBG was publicly presented at the 30th Fast Software Encryption Conference 2024 in Leuven, Belgium.&lt;br /&gt;&lt;br /&gt;The XDRBG uses an extensible output function (XOF) as primitive which allows the use of SHAKE algorithm (FIPS 202), as well as Ascon, the finalist in the NIST lightweight cryptographic algorithm competition. In addition, other XOF functions are allowed to be used with the XDRBG specification.&lt;br /&gt;&lt;br /&gt;The DRBG is significantly smaller compared to the DRBGs defined in SP800-90A. The &lt;a href=&quot;https://tosc.iacr.org/index.php/ToSC/article/view/11399&quot; target=&quot;_blank&quot;&gt;XDRBG specification&lt;/a&gt; not only defines the algorithmic part of the XDRBG, but also provides a mathematical proof of its design. The security proof applies to all usable XOFs. In the not too far future, the XDRBG specification will also be supplemented by an appendix mapping it to the German AIS 20/31 specification. The specification also maps to the model defined in the NIST SP800-90A standard.&lt;br /&gt;&lt;br /&gt;A standalone reference implementation is available at &lt;a href=&quot;https://github.com/smuellerDD/xdrbg&quot; target=&quot;_blank&quot;&gt;Github&lt;/a&gt;.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/6494695554079232735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/03/xdrgb-random-bit-generator-using-any-xof.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6494695554079232735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6494695554079232735'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/03/xdrgb-random-bit-generator-using-any-xof.html' title='XDRGB - Random Bit Generator using any XOF'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAq4eGSCH5Tq9EuOzCKe8pF9aI-IqEgmkjxRMFL3qRMN1OfyCQPTzdBWKGLDApJ0jjqtTo0x2jXXM9Y9rHYo_DuLbY_W__4I96h_djMCEGK8wY8eYOQBdpeJw8CY9S_n5lYRzV43WSDrA66hsMcZGAuHoWAgcrDmZdLz4Me41hxLSsGzFIYAl5nE9KP4/s72-c/xof.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-4541662219198138586</id><published>2024-03-01T11:39:00.008-06:00</published><updated>2024-03-04T09:35:36.770-06:00</updated><title type='text'>Crypto Module Bootcamp 2024</title><content type='html'>&lt;p&gt;On Tuesday, February 27, 2024, atsec information security hosted a free day-long hybrid event on the Concordia University campus in Austin, TX. With 330 registered attendees, both in-person and remote, we have by far surpassed our original attendance estimate.&lt;br /&gt;&lt;br /&gt;When atsec started the International Cryptographic Module Conference (ICMC) in 2013, we wanted to create a forum for the stakeholders in the crypto module world to come together. The ICMC has flourished over the last ten years and is now a well-established and highly regarded conference for IT security professionals. However, the cost involved in traveling and attending the conference has closed the door to students and attendees from academia. &lt;br /&gt;&lt;br /&gt;It is important to us to make events like these easily available to college students. Those students will soon become laboratory testers, agency validators, and developers – the next generation of IT professionals. We have taken pride in educating and lifting up the IT security community, including those studying for the future.&lt;br /&gt;&lt;br /&gt;The bootcamp is an event intended to carry out our idea of attracting a new group of attendees: the STEM students. We started with Concordia and UT Austin. We are pleased to have created the opportunity for students, who could be our future colleagues, to interact with industry and government leaders, as well as policy makers, without meeting and travel expenses.&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;344&quot; data-original-width=&quot;612&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3VGRViGLBltXpBz7_rAErjVZwy7K7aKe0SGFkH1PLGeCeFx-Iu_SjEiPF7o5fes4qQTr6Xls2enBuc6CUzuxbnpd-e8AiDohZ4qVFKCEmVmN6eLFxyXuf3kyTRg1_omPFOQZqiazf6_YVwWzicV-dufKU58RU76cb5uscSfvnvragc9UwBCPDajrvMD0/w640-h360/Screen%20Shot%202024-03-01%20at%2011.22.55%20AM.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;https://atsec.com/bootcamp/&quot; target=&quot;_blank&quot;&gt;Crypto Module Bootcamp&lt;/a&gt; brought students together with experts from academia, industry, government, standards bodies and laboratories for an exchange on topics including artificial intelligence, quantum computers, cryptography, entropy and much more. We wanted to make sure the students got a glimpse of what the world of IT security entails and showcase the variety of ways it touches our lives.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-WXev6awTsRYAq0k6k1OJCjfiz9q0j1NGesDPhpOlSrJ8WFxqG-cLf9Mxpfvz0tYlslZG5LJMsV4obkWQfnPnFks16fqq4zww8zZGPEHMqC1ZMdo2tgsA3znE4NS89J9bw1g7_a9NwD6ZiyPpv6HYU6SeHS3mjpnnx3vktxZRmk76W__HmDIll2-D-xs/s214/Screen%20Shot%202024-03-01%20at%2011.25.12%20AM.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;185&quot; data-original-width=&quot;214&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-WXev6awTsRYAq0k6k1OJCjfiz9q0j1NGesDPhpOlSrJ8WFxqG-cLf9Mxpfvz0tYlslZG5LJMsV4obkWQfnPnFks16fqq4zww8zZGPEHMqC1ZMdo2tgsA3znE4NS89J9bw1g7_a9NwD6ZiyPpv6HYU6SeHS3mjpnnx3vktxZRmk76W__HmDIll2-D-xs/s1600/Screen%20Shot%202024-03-01%20at%2011.25.12%20AM.png&quot; width=&quot;214&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The event opened with a welcome address by atsec president and co-founder Sal La Pietra, followed by an introduction of the first recipient of the Bertrand du Castel Memorial Scholarship. Keynote speaker Professor Scott Aaronson took the stage with a very informative and entertaining presentation about the use of cryptography for Safe AI.&lt;br /&gt;&lt;br /&gt;This was followed by a panel discussion on Safe AI and Secure Cyberspace with Prof. Scott Aaronson; NIST Fellow Dr. Lily Chen; Eric Hibbard, Head of US INCITS delegation for ISO/IEC JTC1/SC27; and the Director of NIAP, Jon Rolf. Dr. Yi Mao, atsec US CEO, moderated the panel discussion.&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;344&quot; data-original-width=&quot;612&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8aqN6eNO0U1aCdwfy8ZjS8HfYK3cFn-zEQCQllT7C3JlPVCT3BQ-rvC2P_lSIGjxYKHE0tcZ09G0nZmSwXI4i4UVKD5GNNSkDM1-tZvk3MXDtS9vG1cOJBDtu-zzbEQK89ehGM9ReCS89YPeZxRSFAiswC5ot8AF8AHk8j7SHBKVPKt99k_Fd654U5Jc/w640-h360/Screen%20Shot%202024-03-01%20at%2011.26.12%20AM.png&quot; width=&quot;620&quot; /&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;The event was perceived as a combination of mini &lt;a href=&quot;https://icmconference.org/&quot; target=&quot;_blank&quot;&gt;ICMC&lt;/a&gt; and mini &lt;a href=&quot;https://iccconference.org/&quot; target=&quot;_blank&quot;&gt;ICCC&lt;/a&gt;, with topics ranging from AI safety to the connected car. An attendee commented, “Its significance is far beyond cryptographic modules. It touched on many aspects for the future cryptographic standards and validation program.” You can find the complete line-up of speakers and panelists, as well as a list of the presentations here at the &lt;a href=&quot;https://atsec.com/bootcamp/&quot; target=&quot;_blank&quot;&gt;event website&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;682&quot; data-original-width=&quot;1216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3GJ3lUQxjs-dqciISQyUSqIQv8nqi_lynKYP6QH2AQqjoSizf2R20Va6cARG3j3zppqazoPXyXMb025nwgJ6Xcb2kwxabVwFp5ohjzAz9wBUmFl4E5eaKDL7GjMwEZntjj6XJcSwJNnwh-nmS9-9v6V4Y_lTtMbc6DRoahutCKhiazhQ2dJjX2xRQz4I/w640-h358/Screen%20Shot%202024-03-01%20at%2011.29.49%20AM.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;br /&gt;After a full day of presentations and discussions, the day ended with a tour of the beautiful Concordia University nature preserve. The overwhelmingly positive feedback and questions about making this a recurring event showed us that we are on the right track. We would like to thank Concordia University, the guest speakers, and all of the participants for making the first bootcamp such a success.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij3YIaZrGPR9e2akn8Hw9wzn2zblfQksgrGxqjrVk3losSwrChbjk_eKvl1nOs1QrHledZHD86HCDSKDUkWz3oXvhDJZtLDqkpCow9geZumY84YDULRbKY3ThtIkJvbjW4oi1_0orkcpeaMoJ6RJ1Felcx16pkt2YoLpC4vPgStxmo7JE8YlQSO_8seZs/s452/Screen%20Shot%202024-03-01%20at%2011.31.20%20AM.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;360&quot; data-original-width=&quot;452&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij3YIaZrGPR9e2akn8Hw9wzn2zblfQksgrGxqjrVk3losSwrChbjk_eKvl1nOs1QrHledZHD86HCDSKDUkWz3oXvhDJZtLDqkpCow9geZumY84YDULRbKY3ThtIkJvbjW4oi1_0orkcpeaMoJ6RJ1Felcx16pkt2YoLpC4vPgStxmo7JE8YlQSO_8seZs/s320/Screen%20Shot%202024-03-01%20at%2011.31.20%20AM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This event was also put together in memory of our friend and colleague, Dr. Betrand du Castel. His wife, Christine, gave a heartfelt speech commemorating his life. We invite you to read our &lt;a href=&quot;https://atsec-information-security.blogspot.com/2022/09/icmc-and-dr-bertrand-du-castel.html&quot; target=&quot;_blank&quot;&gt;blog article&lt;/a&gt; on Bertrand du Castel and his exceptional contributions to the field of smart card security. We took the opportunity to collect some deeply touching stories and insightful quotes from a few of Bertrand’s former colleagues and friends.&lt;br /&gt;&lt;br /&gt;On behalf of Concordia University, who generously opened their campus for this event, we invite you to donate to their STEM program.&lt;br /&gt;&lt;br /&gt;Donations can be made online at &lt;a href=&quot;http://www.concordia.edu/giving/&quot;&gt;www.concordia.edu/giving/&lt;/a&gt;&lt;br /&gt;Please put “du Castel” in the comments. &lt;br /&gt;&amp;nbsp;&lt;br /&gt;Or you can mail a check to:&lt;br /&gt;Concordia University Texas&lt;br /&gt;11400 Concordia University Drive&lt;br /&gt;Austin, Texas 78726 &lt;br /&gt;&amp;nbsp;&lt;br /&gt;For more information, please contact &lt;br /&gt;April Kerwin at &lt;a href=&quot;mailto:april.kerwin@concordia.edu&quot;&gt;april.kerwin@concordia.edu&lt;/a&gt; or 512-313-5101&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/4541662219198138586/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/03/crypto-module-bootcamp-2024.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4541662219198138586'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4541662219198138586'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/03/crypto-module-bootcamp-2024.html' title='Crypto Module Bootcamp 2024'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3VGRViGLBltXpBz7_rAErjVZwy7K7aKe0SGFkH1PLGeCeFx-Iu_SjEiPF7o5fes4qQTr6Xls2enBuc6CUzuxbnpd-e8AiDohZ4qVFKCEmVmN6eLFxyXuf3kyTRg1_omPFOQZqiazf6_YVwWzicV-dufKU58RU76cb5uscSfvnvragc9UwBCPDajrvMD0/s72-w640-h360-c/Screen%20Shot%202024-03-01%20at%2011.22.55%20AM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-333441353582701629</id><published>2024-02-14T01:00:00.002-06:00</published><updated>2024-02-14T08:50:15.265-06:00</updated><title type='text'>Happy Valentine&#39;s Day!</title><content type='html'>&lt;img border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;960&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHWBM9tRv4LZ9JIdGUvCPfxaAWtkd8IxUR9TOn67_saHkPgMv4-eYKr0skvToilF-iDmn3NiwBxJNnXnI4-mHWICelMJ9nqpbe1H8MESbDTl9gw-WszhFfAb0VRbbgln2kG46vKnyCkkXlMxrKEG5vurMuoK_kyR5Wnaof2Lmncus_rtrwTJPcWujSGYQ/w640-h360/ATSEC%20Valentine2_sm.gif&quot; width=&quot;620&quot; /&gt;
Happy Valentine&#39;s Day to our customers, our partners, colleagues and communities around the world that we work with.</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/333441353582701629/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/02/happy-valentines-day.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/333441353582701629'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/333441353582701629'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/02/happy-valentines-day.html' title='Happy Valentine&#39;s Day!'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHWBM9tRv4LZ9JIdGUvCPfxaAWtkd8IxUR9TOn67_saHkPgMv4-eYKr0skvToilF-iDmn3NiwBxJNnXnI4-mHWICelMJ9nqpbe1H8MESbDTl9gw-WszhFfAb0VRbbgln2kG46vKnyCkkXlMxrKEG5vurMuoK_kyR5Wnaof2Lmncus_rtrwTJPcWujSGYQ/s72-w640-h360-c/ATSEC%20Valentine2_sm.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-5378965565913276236</id><published>2024-01-11T02:33:00.001-06:00</published><updated>2024-01-11T15:02:24.604-06:00</updated><title type='text'>Happy Birthday, atsec!</title><content type='html'>&lt;div style=&quot;padding: 56.25% 0px 0px; position: relative;&quot;&gt;&lt;iframe allow=&quot;autoplay; fullscreen; picture-in-picture&quot; frameborder=&quot;0&quot; src=&quot;https://player.vimeo.com/video/901552266?h=b1e4d7a324&amp;amp;badge=0&amp;amp;autopause=0&amp;amp;player_id=0&amp;amp;app_id=58479&quot; style=&quot;height: 100%; left: 0; position: absolute; top: 0; width: 100%;&quot; title=&quot;Happy Birthday, atsec!&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;script src=&quot;https://player.vimeo.com/api/player.js&quot;&gt;&lt;/script&gt;&lt;p&gt;As always on the 11th of January atsec celebrates its birthday. &lt;br /&gt;This year it is the &lt;b&gt;24th&lt;/b&gt;! As they say: time flies when you&#39;re doing IT security!&lt;br /&gt;Our best wishes and thanks to all of the contributors: our customers, our partners, and our colleagues.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/5378965565913276236/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2024/01/happy-birthday-atsec.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/5378965565913276236'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/5378965565913276236'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2024/01/happy-birthday-atsec.html' title='Happy Birthday, atsec!'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-6740558602839917005</id><published>2023-12-21T11:44:00.002-06:00</published><updated>2023-12-21T11:44:54.322-06:00</updated><title type='text'>Merry Christmas and a Happy New Year from atsec</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;https://player.vimeo.com/video/896272223?h=0822d81cd9&quot; title=&quot;vimeo-player&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;&lt;p&gt;The whole atsec team wishes our colleagues, customers, partners and suppliers a Merry Christmas and a Happy New Year.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/6740558602839917005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/merry-christmas-and-happy-new-year-from.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6740558602839917005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6740558602839917005'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/merry-christmas-and-happy-new-year-from.html' title='Merry Christmas and a Happy New Year from atsec'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-4175087933207660927</id><published>2023-12-21T11:44:00.001-06:00</published><updated>2023-12-21T11:44:13.539-06:00</updated><title type='text'>CST Newsletter December 2023</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTa7OO0aLZ9X8qhTxYwIoNluAPaZazGDaAmUgvk40tDBSuT1UGRB8ZiY2qcY5-Lq-rsI36W7__KuFltH2UynLMZ2iiK3U3K9XyeczoyjvaDtuAgYVqAby2X_JbgGaxudstSJvgHq25vF_E_pXi_qFD7va63FRUyRhV9-nf5qbDkkVJITp4pX1dDu3n-AM/s801/Screen%20Shot%202023-12-21%20at%2011.36.41%20AM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;715&quot; data-original-width=&quot;801&quot; height=&quot;286&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTa7OO0aLZ9X8qhTxYwIoNluAPaZazGDaAmUgvk40tDBSuT1UGRB8ZiY2qcY5-Lq-rsI36W7__KuFltH2UynLMZ2iiK3U3K9XyeczoyjvaDtuAgYVqAby2X_JbgGaxudstSJvgHq25vF_E_pXi_qFD7va63FRUyRhV9-nf5qbDkkVJITp4pX1dDu3n-AM/s320/Screen%20Shot%202023-12-21%20at%2011.36.41%20AM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We invite you to take a look at our &lt;a href=&quot;https://www.atsec.com/wp-content/uploads/2023/12/FIPS-newsletter-2023-12.pdf&quot;&gt;current newsletter &lt;/a&gt;that contains information on algorithm transitions, updates to the FIPS IG and announcements for FIPS 140-2 and FIPS 140-3.&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/4175087933207660927/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/cst-newsletter-december-2023.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4175087933207660927'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4175087933207660927'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/cst-newsletter-december-2023.html' title='CST Newsletter December 2023'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTa7OO0aLZ9X8qhTxYwIoNluAPaZazGDaAmUgvk40tDBSuT1UGRB8ZiY2qcY5-Lq-rsI36W7__KuFltH2UynLMZ2iiK3U3K9XyeczoyjvaDtuAgYVqAby2X_JbgGaxudstSJvgHq25vF_E_pXi_qFD7va63FRUyRhV9-nf5qbDkkVJITp4pX1dDu3n-AM/s72-c/Screen%20Shot%202023-12-21%20at%2011.36.41%20AM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-979841620463040102</id><published>2023-12-04T14:44:00.022-06:00</published><updated>2023-12-05T12:04:57.968-06:00</updated><title type='text'>A FIPS 140-3 compliant hybrid KEM algorithm</title><content type='html'>&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiARZFp1D1ZcUq-EcB3mCpXnERJM6_h2OcQ5BU08e1PABSc7RWRt4xKpE_kwxLmSVgEgludSbzvgudHYvWeXzzKQm1kVrxz6Nfd10X4On4LUUi2pHCnlU82A_mToYqaHqx60Yw9w1ymMr9zgfknV_Fs1EThzbpjL-Nf3uXZvY1_b9QfketuZUvR2yI2mY/s363/kyber.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;135&quot; data-original-width=&quot;363&quot; height=&quot;149&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiARZFp1D1ZcUq-EcB3mCpXnERJM6_h2OcQ5BU08e1PABSc7RWRt4xKpE_kwxLmSVgEgludSbzvgudHYvWeXzzKQm1kVrxz6Nfd10X4On4LUUi2pHCnlU82A_mToYqaHqx60Yw9w1ymMr9zgfknV_Fs1EThzbpjL-Nf3uXZvY1_b9QfketuZUvR2yI2mY/w400-h149/kyber.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;Hybrid KEM - Kyber &amp;amp; X25519&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;In addition to the sole use of Kyber KEM, a hybrid mechanism using X25519 can be devised that acts as a drop-in replacement for Kyber KEM. In this case, a PQC algorithm is merged with a classic key establishment algorithm. The basis is the enhancement of the Kyber KEM encapsulation and decapsulation algorithms as follows.&lt;br /&gt;&lt;br /&gt;When using the &lt;a href=&quot;https://www.chronox.de/papers/KyberKEX_2way_handshake_specification.pdf&quot; target=&quot;_blank&quot;&gt;hybrid KEX algorithm&lt;/a&gt;, instead of the sole KEM encapsulation and decapsulation operations, the hybrid variants that are outlined in the subsequent subsections are used. In addition, the Kyber KEX data along with the X25519 data is exchanged in the same manner as outlined for the standalone Kyber KEX. Thus, the KEX operation is not re-iterated here.&lt;br /&gt;&lt;br /&gt;The presented algorithm ensures that even if one algorithm is compromised, the resulting shared secret is still cryptographically strong and compliant with the strength of the uncompromised algorithm. However, it is to be noted that Kyber may have a cryptographic strength of up to 256 bits when using Kyber 1024. On the other hand, the cryptographic strength of X25519 is significantly lower - between 80 and 128 bits - depending on the analysis approach.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hybrid KEM Key Generation&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;As part of the hybrid KEM key generation, the following steps are performed:&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Generation of the Kyber key pair yielding the Kyber &lt;span style=&quot;font-family: courier;&quot;&gt;pk_kyber&lt;/span&gt; and &lt;span style=&quot;font-family: courier;&quot;&gt;sk_kyber&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Generation of the X25519 key pair yielding the X25519 &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519&lt;/span&gt; and &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519&lt;/span&gt;.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Both public keys and both secret keys are maintained together so that every time the hybrid KEM requires a public key, the Kyber and X25519 public keys are provided. The same applies to the secret keys.&lt;br /&gt;&lt;br /&gt;Thus the following holds:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt; = &lt;span style=&quot;font-family: courier;&quot;&gt;pk_kyber&lt;/span&gt; || &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt; = &lt;span style=&quot;font-family: courier;&quot;&gt;sk_kyber&lt;/span&gt; || &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Both, &lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt; and &lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt; are the output of the hybrid KEM key generation operation.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hybrid KEM Encapsulation&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The hybrid KEM encapsulation applies the following steps using the input of the hybrid KEM public key &lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt;:&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Invocation of the Kyber encapsulation operation to generate the Kyber shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;ss_kyber&lt;/span&gt; and the Kyber ciphertext &lt;span style=&quot;font-family: courier;&quot;&gt;ct_kyber&lt;/span&gt; using the &lt;span style=&quot;font-family: courier;&quot;&gt;pk_kyber&lt;/span&gt; public key presented with &lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Generation of an ephemeral X25519 key pair &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519_e&lt;/span&gt; and &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519_e&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Invocation of the X25519 Diffie-Hellman operation with the X25519 public key &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519&lt;/span&gt; provided via &lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt; and the ephemeral secret key &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519_e&lt;/span&gt;. This generates the shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;ss_x25519&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Secure deletion of the &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519_e&lt;/span&gt; ephemeral secret key.&lt;br /&gt;The operation returns the following data:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Public data: &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt; = &lt;span style=&quot;font-family: courier;&quot;&gt;ct_kyber&lt;/span&gt; || &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519_e&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Secret data: &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt; = &lt;span style=&quot;font-family: courier;&quot;&gt;ss_kyber&lt;/span&gt; || &lt;span style=&quot;font-family: courier;&quot;&gt;ss_x25519&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;The data &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt; is to be shared with the peer that performs the decapsulation operation.&lt;br /&gt;&lt;br /&gt;On the other hand &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt; is the raw shared secret obtained as part of the encapsulation operation and must remain secret. It is processed with a KDF as outlined in section &lt;i&gt;Hybrid KEM Shared Secret Derivation&lt;/i&gt; below.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hybrid KEM Decapsulation&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The hybrid KEM decapsulation applies the following steps using the input of the hybrid KEM secret key &lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt; and the public data resulting from the hybrid KEM encapsulation operation &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt;.&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Invocation of the Kyber decapsulation operation to generate the Kyber shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;ss_kyber&lt;/span&gt; by using &lt;span style=&quot;font-family: courier;&quot;&gt;ct_kyber&lt;/span&gt; present in &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt; and the Kyber secret key &lt;span style=&quot;font-family: courier;&quot;&gt;sk_kyber&lt;/span&gt; found in &lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Invocation of the X25519 Diffie-Hellman operation with the X25519 secret key &lt;span style=&quot;font-family: courier;&quot;&gt;sk_x25519&lt;/span&gt; provided via &lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt; and the ephemeral public key &lt;span style=&quot;font-family: courier;&quot;&gt;pk_x25519_e&lt;/span&gt; provided via &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt; which returns the shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;ss_x25519&lt;/span&gt;.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;The operation returns the following data:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Secret data: &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt; = &lt;span style=&quot;font-family: courier;&quot;&gt;ss_kyber&lt;/span&gt; || &lt;span style=&quot;font-family: courier;&quot;&gt;ss_x25519&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The data of &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt; is the raw shared secret obtained as part of the encapsulation operation and must remain secret - it is the same data as calculated during the encapsulation step. It is processed with a KDF as outlined in the section &lt;i&gt;Hybrid KEM Shared Secret Derivation&lt;/i&gt; below.&lt;br /&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hybrid KEM Shared Secret Derivation&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;To obtain a shared secret of arbitrary length that can be used as key material, a key derivation function is used as allowed by SP800-56C rev 2 section 2:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The chosen and KDF is based on SP800-108 rev 1.&lt;/li&gt;&lt;li&gt;In addition, the input to the KDF is formatted such that the entire hybrid KEM construction is compliant with SP800-56C rev 2 assuming that Kyber KEM is the approved algorithm and X25519 provides an auxiliary key agreement mechanism. Thus, section 2 of SP800-56C rev 2 with its requirement &lt;span style=&quot;font-family: courier;&quot;&gt;Z&#39; = Z || T&lt;/span&gt; is fulfilled by defining the &quot;standard&quot; shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;Z&lt;/span&gt; is provided by Kyber and that the auxiliary shared secret &lt;span style=&quot;font-family: courier;&quot;&gt;T&lt;/span&gt; is provided by X25519.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Considering that Kyber uses SHAKE / SHA-3 in its internal processing, the selected KDF is KMAC256 as defined in SP800-108 rev 1. KMAC is invoked as follows:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KMAC256(K = ss_hybrid,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X = ct_hybrid,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; L = requested SS length,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; S = &quot;Kyber X25519 KEM SS&quot;)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When considering the structure of &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt; and &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt;, the KDF operates on the following specific data:&lt;br /&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KMAC256(K = ss_kyber || ss_x25519,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X = ct_kyber || pk_x25519_e,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; L = requested SS length,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; S = &quot;Kyber X25519 KEM SS&quot;)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The KMAC customization string &lt;span style=&quot;font-family: courier;&quot;&gt;S&lt;/span&gt; is selected arbitrarily and can contain any string including the &lt;span style=&quot;font-family: courier;&quot;&gt;NULL&lt;/span&gt; string.&lt;br /&gt;&lt;br /&gt;The result of the KDF is intended to be usable as key material for other cryptographic operations. That derived key material now contains the individual security strengths of both Kyber and X25519. Both algorithms are used such that any security break of either algorithm will not impact the strength of the resulting shared secret of the respective other. By concatenating the individual shared secret values as input into the KDF, the result of the KDF will have the security strength of one algorithm even if the respective other algorithm is broken.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hybrid KEX Algorithm&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Using the hybrid KEM algorithm outlined in the preceding subsections, the hybrid KEX algorithm as specified in the documentation of the secure connection approach can be obtained by the following considerations: use of the Kyber KEX approach outlined at the beginning, but apply the following changes:&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Replace all occurrences of &lt;span style=&quot;font-family: courier;&quot;&gt;pk&lt;/span&gt; with &lt;span style=&quot;font-family: courier;&quot;&gt;pk_hybrid&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Replace all occurrences of &lt;span style=&quot;font-family: courier;&quot;&gt;sk&lt;/span&gt; with &lt;span style=&quot;font-family: courier;&quot;&gt;sk_hybrid&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Replace all occurrences of &lt;span style=&quot;font-family: courier;&quot;&gt;ss&lt;/span&gt; with &lt;span style=&quot;font-family: courier;&quot;&gt;ss_hybrid&lt;/span&gt;. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Replace all occurrences of &lt;span style=&quot;font-family: courier;&quot;&gt;ct&lt;/span&gt; with &lt;span style=&quot;font-family: courier;&quot;&gt;ct_hybrid&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Replace all invocations of the Kyber standalone functions (key generation, encapsulation, decapsulation) with their respective hybrid variants outlined above.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;This implies that the hybrid KEM as well as the hybrid KEX algorithms are usable as a direct drop-in replacement for the standalone Kyber algorithm use case. The only difference is that the resulting data is larger as it contains the X25519 data as well.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.chronox.de/papers/Hybrid_KEM_algorithm.pdf&quot; target=&quot;_blank&quot;&gt;You can download a PDF version of the process here.&lt;/a&gt;&lt;/p&gt;&lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot; target=&quot;_blank&quot;&gt;An implementation of both hybrid KEM and hybrid KEX is provided here.&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/979841620463040102/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/a-fips-140-3-compliant-hybrid-kem.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/979841620463040102'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/979841620463040102'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/12/a-fips-140-3-compliant-hybrid-kem.html' title='A FIPS 140-3 compliant hybrid KEM algorithm'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiARZFp1D1ZcUq-EcB3mCpXnERJM6_h2OcQ5BU08e1PABSc7RWRt4xKpE_kwxLmSVgEgludSbzvgudHYvWeXzzKQm1kVrxz6Nfd10X4On4LUUi2pHCnlU82A_mToYqaHqx60Yw9w1ymMr9zgfknV_Fs1EThzbpjL-Nf3uXZvY1_b9QfketuZUvR2yI2mY/s72-w400-h149-c/kyber.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-4567156999023780466</id><published>2023-11-17T10:45:00.075-06:00</published><updated>2023-11-20T14:46:18.162-06:00</updated><title type='text'>PQC: Kyber and Dilithium - State of the (Draft) Standards</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;by Stephan Mueller&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;165&quot; data-original-width=&quot;800&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmzGXQ1SLbTqUTjsaYVRxhIGnfJ1rn3JJJpcDVEwtec_t523KG0BWKLZAdfGvsr3OMRaLikadUBu13ZL7GDmoZ0MsPperGclivqA2gXSrvEVQN_bTJNBRhvTt-si7ALXcFveZ_0sxhOTixS4WHSAhpOspgDj6qiT-Jt2fY-W93QnSrw5FlM0vc7nIFdyM/w640-h132/algos.png&quot; width=&quot;620&quot; /&gt;&lt;br /&gt;&lt;br /&gt;On August 24 2023 NIST published the first drafts of:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;FIPS 203 specifying Module-Lattice-based Key-Encapsulation Mechanism (ML-KEM) which is based on CRYSTALS Kyber;&lt;/li&gt;&lt;li&gt;FIPS 204 specifying Module-Lattice-Based Digital Signature (ML-DSA) which is based on CRYSTALS Dilithium; and&lt;/li&gt;&lt;li&gt;FIPS 205 specifying Stateless Hash-Based Digital Signature (SLH-DSA) which is based on SPHINCS+.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;On November 15 2023 NIST announced that the three algorithms will be available for testing at the ACVP Demo service. During the course of the development of both Kyber and Dilithium reference implementations, NIST developers reached out to atsec to compare intermediate results of both algorithms with implementations available to atsec. This comparison covered all data calculated during the intermediate steps of the processing, including:&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Kyber:&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;all steps of the key generation processing of ML-KEM.Keygen and K-PKE.KeyGen;&lt;/li&gt;&lt;li&gt;all steps of the key encapsulation processing of ML-KEM.Encaps and K-PKE.Encrypt; &lt;/li&gt;&lt;li&gt;all steps of the key decapsulation processing of ML-KEM.Decaps and K-PKE.Decrypt;&lt;/li&gt;&lt;li&gt;ensuring that all Kyber types of ML-KEM-512, ML-KEM-768, and ML-KEM-1024 are subject to the comparison work.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Dilithium:&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;all steps of the key generation processing of ML-DSA.Keygen;&lt;/li&gt;&lt;li&gt;all steps of the key encapsulation processing of ML-DSA.Sign; &lt;/li&gt;&lt;li&gt;all steps of the key decapsulation processing of ML-DSA.Verify;&lt;/li&gt;&lt;li&gt;ensuring that all Dilithium types of ML-DSA-44, ML-DSA-65, and ML-DSA-87 are covered by the comparison analysis.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The implementation used by atsec was &lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot; target=&quot;_blank&quot;&gt;leancrypto&lt;/a&gt;, which was based on the Round 3 submission for CRYSTALS Kyber and CRYSTALS Dilithium at the time the collaboration with NIST was conducted. The NIST team as well as atsec identified several issues in the FIPS 203 and FIPS 204 draft standards, which are listed in their entirety below. The NIST team acknowledged that the respective issues will be eliminated in updates to both standards. This implies that developers using the current draft standards should be aware of those issues and upcoming modifications when basing their implementation on the respective FIPS draft standards.&lt;br /&gt;&lt;br /&gt;The list of issues also shows their resolution at the time of writing. Please note that these updates are neither specified by the current standards nor endorsed by NIST yet. These changes were implemented in&amp;nbsp;leancrypto and lead to consistent results compared to the implementations developed by NIST that are likely to be used as the ACVP reference implementations.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Kyber:&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Algorithm 12 step 19 shows the dot-multiplication of the final part of the key generation: t = As + e. Step 19 specifies that AHat has to be used for the operation. However, in this step, the transposed version of AHat has to be used. This modification brings the FIPS 203 specification in line with the Round 3 submission of the CRYSTALS Kyber algorithm.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Dilithium:&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The size of the private key for Dilithium types is by 256 bits larger. This is due to the enlargement of the size of the hash of the public key referenced as tr, which was not taken into account by the draft FIPS 204.&lt;/li&gt;&lt;li&gt;The size of the signature for ML-DSA-65 is larger by 128 bits and for ML-DSA-87 is larger by 256 bits. This is due to increase of the size of c-tilde in FIPS 204, which was not considered for the calculation of the signature size.&lt;/li&gt;&lt;li&gt;Algorithm 2 specifies the size of the signature as output to be B^(32....) which needs actually is B^((lambda / 4)...) due to the increase of the c-tilde variable. Note, this change is already applied to the auxiliary algorithm specifications given in chapter 8 of FIPS 204.&lt;/li&gt;&lt;li&gt;Algorithm 3 requires the same change for the specification of the input signature as given for Algorithm 2 above.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;An implementation that is compliant with the NIST implementation that includes all the mentioned fixes is provided with leancrypto. It allows developers to compile both Kyber and Dilithium in a debug mode where the calculation results of each step of the key generation, Kyber encapsulation and decapsulation, as well as the Dilithium signature generation and verification can be displayed. This allows other developers to compare their implementation to match with leancrypto. The following steps have to be taken to obtain the debug output after fetching the library from the provided link and making sure the meson build system is available:&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Kyber:&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Setup of the build directory: &lt;span style=&quot;font-family: courier;&quot;&gt;meson setup build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Configure Kyber debug mode: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Dkyber_debug=enabled&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Compile the code: &lt;span style=&quot;font-family: courier;&quot;&gt;meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Kyber, ML-KEM-1024: &lt;span style=&quot;font-family: courier;&quot;&gt;build/kem/tests/kyber_kem_tester_c&lt;/span&gt;&lt;/li&gt;&lt;li&gt;To obtain the output for ML-KEM-768, enable it: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Dkyber_strength=3&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Compile the code:&lt;/span&gt;&lt;span style=&quot;font-family: courier;&quot;&gt; meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Kyber, ML-KEM-768: &lt;span style=&quot;font-family: courier;&quot;&gt;build/kem/tests/kyber_kem_tester_c&lt;/span&gt;&lt;/li&gt;&lt;li&gt;To obtain the output for ML-KEM-512, enable it: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Dkyber_strength=2&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Compile the code:&lt;/span&gt;&lt;span style=&quot;font-family: courier;&quot;&gt; meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Kyber, ML-KEM-512: &lt;span style=&quot;font-family: courier;&quot;&gt;build/kem/tests/kyber_kem_tester_c&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;b&gt;Dilithium&lt;/b&gt;&lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Setup of the build directory (if it was not already set up for the Kyber tests): &lt;span style=&quot;font-family: courier;&quot;&gt;meson setup build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Configure Dilithium debug mode: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Ddilithium_debug=enabled&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Compile the code: &lt;span style=&quot;font-family: courier;&quot;&gt;meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Dilithium, ML-DSA-87: &lt;span style=&quot;font-family: courier;&quot;&gt;build/signature/tests/dilithium_tester_c&lt;/span&gt;&lt;/li&gt;&lt;li&gt;To obtain the output for ML-DSA-65, enable it: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Ddilithium_strength=3&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Compile the code:&lt;/span&gt;&lt;span style=&quot;font-family: courier;&quot;&gt; meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Dilithium, ML-DSA-65: &lt;span style=&quot;font-family: courier;&quot;&gt;build/signature/tests/dilithium_tester_c&lt;/span&gt;&lt;/li&gt;&lt;li&gt;To obtain the output for ML-DSA-44, enable it: &lt;span style=&quot;font-family: courier;&quot;&gt;meson configure build -Ddilithium_strength=2&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Compile the code:&lt;/span&gt;&lt;span style=&quot;font-family: courier;&quot;&gt; meson compile -C build&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Execute the test tool providing the output of Dilithium, ML-DSA-44: &lt;span style=&quot;font-family: courier;&quot;&gt;build/signature/tests/dilithium_tester_c&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;The test tool outputs is segmented into the key generation steps, Dilithium signature generation and verification steps, as well as Kyber encapsulation and decapsulation steps. The output specifies the mathematical operation whose result is shown. When displaying the output of a vector, one line is used. When displaying a matrix, the output of one row of the matrix is displayed per line. This implies that as many lines are printed as rows are present in the matrix.&lt;br /&gt;&lt;br /&gt;The debug logging information was used as a basis for the discussion with the NIST development team to verify that both implementations i.e. the NIST reference implementation as well as leancrypto, correspond.&lt;/p&gt;&lt;p&gt;Considering that the FIPS 203 draft also specifies a minimum input validation in sections 6.2 and 6.3, those checks are implemented with leancrypto in the function &lt;span style=&quot;font-family: courier;&quot;&gt;kyber_kem_iv_sk_modulus&lt;/span&gt;. The other checks requiring the size verification of the input data are implicit due to the used data types forcing the caller to provide exactly the required amount of data. &lt;br /&gt;&lt;/p&gt;&lt;p&gt;leancrypto can be found here: &lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot;&gt;https://github.com/smuellerDD/leancrypto&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/4567156999023780466/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/11/pqc-kyber-and-dilithium-state-of-draft.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4567156999023780466'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4567156999023780466'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/11/pqc-kyber-and-dilithium-state-of-draft.html' title='PQC: Kyber and Dilithium - State of the (Draft) Standards'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmzGXQ1SLbTqUTjsaYVRxhIGnfJ1rn3JJJpcDVEwtec_t523KG0BWKLZAdfGvsr3OMRaLikadUBu13ZL7GDmoZ0MsPperGclivqA2gXSrvEVQN_bTJNBRhvTt-si7ALXcFveZ_0sxhOTixS4WHSAhpOspgDj6qiT-Jt2fY-W93QnSrw5FlM0vc7nIFdyM/s72-w640-h132-c/algos.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-7338279677414149565</id><published>2023-11-15T14:47:00.003-06:00</published><updated>2023-11-15T14:47:40.594-06:00</updated><title type='text'>atsec at the PCI Community Meeting 2023</title><content type='html'>&lt;p&gt;atsec participated in the PCI (Payment Card Industry) Security Standards Council 2023 Asia-Pacific Community Meeting held in Kuala Lumpur, Malaysia, on 15 and 16 November and hosted a booth.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYO6Vuh3YR9COsS6Sy2wHS3MsX1Q5I7pkaCtGAX7AefC5NsTMDr0aZORSGTzordtFeljQzKSPjmtfpDtoOB0LwQAkTKFWAxX-VtgHYymnTYRMsX4CP4eejPPwwC1TODFrTAcRD6Avez5VNTsfW4E7h1pjLq9myCdc3J-BihK4uL1fF-A_GHnbMMasZYPc/s1274/china_blog-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;990&quot; data-original-width=&quot;1274&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYO6Vuh3YR9COsS6Sy2wHS3MsX1Q5I7pkaCtGAX7AefC5NsTMDr0aZORSGTzordtFeljQzKSPjmtfpDtoOB0LwQAkTKFWAxX-VtgHYymnTYRMsX4CP4eejPPwwC1TODFrTAcRD6Avez5VNTsfW4E7h1pjLq9myCdc3J-BihK4uL1fF-A_GHnbMMasZYPc/w400-h311/china_blog-1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;atsec’s principal consultant Di Li provided a presentation on “Our &#39;Key&#39; Experience in PIN Security / P2PE / FIPS 140-3.”&lt;p&gt;&lt;/p&gt;&lt;p&gt;A short summary of the presentation is as follows: &lt;br /&gt;Regarding key generation, the paper discusses the generation requirements and methods defined in each of the three standards, compares the differences, and provides a rationale for why each standard requires a different approach. The section on key distribution and key establishment explores the different methods of securely transferring a key from one party to another. The paper defines each of these methods and provides common scenarios where they apply. The paper also provides several methods for key destruction, such as physical destruction, and logical cryptographic zeroization.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODuh8uautTeZQjnTSxYnhPRjo8aPphkwUJQsa3Bp8Skch7y51P913Fj_VU4Rim6AeNtIagvRn3cFb9XN5DnaegjczZ1w6dmHZOa9-hAk9Z7M2eDcNtiBLmVf-PWnIXkAiezSCOOFoJaj-25o_GyEsjHJjsoNDWl2HMamw94sTq7PuWuVM4HFmQKWJ86Y/s1274/china_blog-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;528&quot; data-original-width=&quot;1274&quot; height=&quot;166&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODuh8uautTeZQjnTSxYnhPRjo8aPphkwUJQsa3Bp8Skch7y51P913Fj_VU4Rim6AeNtIagvRn3cFb9XN5DnaegjczZ1w6dmHZOa9-hAk9Z7M2eDcNtiBLmVf-PWnIXkAiezSCOOFoJaj-25o_GyEsjHJjsoNDWl2HMamw94sTq7PuWuVM4HFmQKWJ86Y/w400-h166/china_blog-2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/7338279677414149565/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/11/atsec-at-pci-community-meeting-2023.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7338279677414149565'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/7338279677414149565'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/11/atsec-at-pci-community-meeting-2023.html' title='atsec at the PCI Community Meeting 2023'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYO6Vuh3YR9COsS6Sy2wHS3MsX1Q5I7pkaCtGAX7AefC5NsTMDr0aZORSGTzordtFeljQzKSPjmtfpDtoOB0LwQAkTKFWAxX-VtgHYymnTYRMsX4CP4eejPPwwC1TODFrTAcRD6Avez5VNTsfW4E7h1pjLq9myCdc3J-BihK4uL1fF-A_GHnbMMasZYPc/s72-w400-h311-c/china_blog-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-6455473525138248992</id><published>2023-10-31T09:29:00.002-05:00</published><updated>2023-10-31T09:29:29.883-05:00</updated><title type='text'>atsec at the International Common Criteria Conference 2023</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuiHBj8ymCjeFNZCLsa1YKu4oW1741wZSXyIHI64HGvbp2-c62kP_5AA0Js0pEkONsRmcSn2FSpQHv-0MQFvp0q233O3zQzsNpTxM737sZFVSTZncPJdWbv1ezKo-EjiVXWsNd0wuq-wWLUM9gvwOkamF-fATTNz-1pHMNktYpfrOzsWjCciW8g7R8Qdw/s4967/ICCC-2023.jpg&quot; style=&quot;display: block; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;3881&quot; data-original-width=&quot;4967&quot; height=&quot;313&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuiHBj8ymCjeFNZCLsa1YKu4oW1741wZSXyIHI64HGvbp2-c62kP_5AA0Js0pEkONsRmcSn2FSpQHv-0MQFvp0q233O3zQzsNpTxM737sZFVSTZncPJdWbv1ezKo-EjiVXWsNd0wuq-wWLUM9gvwOkamF-fATTNz-1pHMNktYpfrOzsWjCciW8g7R8Qdw/w400-h313/ICCC-2023.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;As in previous years, atsec is attending the International Common Criteria Conference, this time in Washington DC from October 31st to November 2nd 2023.&lt;/p&gt;&lt;p&gt;We invite you to come and talk to us at our booth (#10) or attend our colleagues&#39; contributions to the conference:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;CC:2022 – How it Compares and Differs from CC3.1R5 (L21b)&lt;/b&gt; - Trang Huynh&lt;/li&gt;&lt;li&gt;&lt;b&gt;Challenges in the Adoption of CC:2022 for Protection Profiles, PP Modules and Functional Packages (A22a) &lt;/b&gt;- Alejandro Masino&lt;/li&gt;&lt;li&gt;&lt;b&gt;Panel Discussion: Evolution of the Cryptographic Standards Ecosystem (M22b)&lt;/b&gt; - Yi Mao et al.&lt;/li&gt;&lt;li&gt;&lt;b&gt;MDM Server Certification Without NIAP’s MDM PP (D23b)&lt;/b&gt; - Michael Vogel&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/6455473525138248992/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/atsec-at-international-common-criteria.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6455473525138248992'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6455473525138248992'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/atsec-at-international-common-criteria.html' title='atsec at the International Common Criteria Conference 2023'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuiHBj8ymCjeFNZCLsa1YKu4oW1741wZSXyIHI64HGvbp2-c62kP_5AA0Js0pEkONsRmcSn2FSpQHv-0MQFvp0q233O3zQzsNpTxM737sZFVSTZncPJdWbv1ezKo-EjiVXWsNd0wuq-wWLUM9gvwOkamF-fATTNz-1pHMNktYpfrOzsWjCciW8g7R8Qdw/s72-w400-h313-c/ICCC-2023.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-8682737015290800863</id><published>2023-10-31T01:00:00.001-05:00</published><updated>2023-10-31T01:00:00.143-05:00</updated><title type='text'>Happy Halloween!</title><content type='html'>&lt;img border=&quot;0&quot; data-original-height=&quot;480&quot; data-original-width=&quot;405&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj-ptXwYCYoB15TeKfGvqXOfK_DkRVc1KO5gO6TIToeFPcgPTc4Mb0P9htG2iN5r3qrPxcPUtX8TowvpMU9SlLc_S1nvsugxarAT__hilXygUIlIKikAIsb2zimXDzpXJHVAU8eZMZJ3E4jODPn6GeA7fX_gJj5XKwXVezW8Bv27X3sOJjlCcIddQxP5k/w540-h640/halloween_2023.png&quot; width=&quot;540&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/8682737015290800863/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/happy-halloween.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8682737015290800863'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8682737015290800863'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/happy-halloween.html' title='Happy Halloween!'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj-ptXwYCYoB15TeKfGvqXOfK_DkRVc1KO5gO6TIToeFPcgPTc4Mb0P9htG2iN5r3qrPxcPUtX8TowvpMU9SlLc_S1nvsugxarAT__hilXygUIlIKikAIsb2zimXDzpXJHVAU8eZMZJ3E4jODPn6GeA7fX_gJj5XKwXVezW8Bv27X3sOJjlCcIddQxP5k/s72-w540-h640-c/halloween_2023.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-8235074842343273199</id><published>2023-10-13T11:57:00.016-05:00</published><updated>2023-10-13T16:23:35.272-05:00</updated><title type='text'>Cybersecurity Requirements for Medical Devices</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP2ahvbPYryoC0ZN8QeNZiyDKoFvtxOFtJo1TEHWLNKIHrYQSAGeISjWFy3DSS1wmjvR_ffZukcY7Jft8vrGjSJkcInwhH374JnzB9WtYc4antqR6GdlajKOfBXTEBipvzV5aEYq1rKvWq7FGO7S-Yc6k-03fR6hXtFyeWTg21bjGK6act5orBKl0s0nI9/s2454/med-logo.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;516&quot; data-original-width=&quot;2454&quot; height=&quot;67&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP2ahvbPYryoC0ZN8QeNZiyDKoFvtxOFtJo1TEHWLNKIHrYQSAGeISjWFy3DSS1wmjvR_ffZukcY7Jft8vrGjSJkcInwhH374JnzB9WtYc4antqR6GdlajKOfBXTEBipvzV5aEYq1rKvWq7FGO7S-Yc6k-03fR6hXtFyeWTg21bjGK6act5orBKl0s0nI9/s320/med-logo.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;On September 26, 2023, The Food and Drug Administration (FDA) released their finalized Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions guidance document. This document provides general principles for device cybersecurity relevant to device manufacturers. It seeks to emphasize the importance of safeguarding medical devices throughout a product&#39;s life cycle. The guidelines are going beyond security risk management and cybersecurity testing; the guidance recommends that device manufacturers leverage security controls to achieve the outlined security objectives:&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Authenticity, which includes integrity;&lt;/li&gt;&lt;li&gt;Authorization;&lt;/li&gt;&lt;li&gt;Availability;&lt;/li&gt;&lt;li&gt;Confidentiality; and&lt;/li&gt;&lt;li&gt;Secure and timely updatability and patchability. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It is expected that the premarket submissions would include information that describes how the above security objectives are addressed by and integrated into the device design.&lt;br /&gt;&lt;br /&gt;The FDA guidelines clearly state that:&lt;br /&gt;&lt;i&gt;“While software development and cybersecurity are closely related disciplines, cybersecurity controls require testing beyond standard software verification and validation activities to demonstrate the effectiveness of the controls in a proper security context to therefore demonstrate that the device has a reasonable assurance of safety and effectiveness.” &lt;/i&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;It is indeed expected that the security testing documentation should be submitted in the premarket submission and include:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Verification of the implemented security requirements&lt;/li&gt;&lt;li&gt;Effectiveness and adequacy of each cybersecurity risk control&lt;/li&gt;&lt;li&gt;Vulnerability testing, and&lt;/li&gt;&lt;li&gt;Penetration testing &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Medical device security plays a crucial role in safeguarding people using these products and solutions as well as the healthcare organization. Specification of security requirements and provision of guidance to device manufacturers is welcome and very useful. However, it is important to have in mind that most medical devices are used in various geographic regions and must comply with multiple national regulations. FDA regulates medical devices in the U.S., whereas the European Medical Device Regulation (MDR) (EU) 2017/745 that entered into force in 2021 is applicable to any manufacturer seeking to market their medical devices in Europe. Therefore, harmonization of standards and requirements is very much welcome by the device manufacturers. On the other hand, there are initiatives to establish global standards and global certification schemes to assess cybersecurity of the medical devices.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN2fVPPPXYys1SZdPlct7CYq1sMk5aKRnK9l8jwpmB9YE6iKZY1fzHT_E5zstFRfS-KoMT0M2R8p6ImIo3A6NqXKeLLyQbgpK4JisMdss2PLG3Y2SnTA5AKJgXxcVKlDDCC6J9YONbZIQxVuOAFFmz-0vMK9J7dANgHf1mkiQFmFqrimQJHxESJ0Gjm68/s348/Picture0.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;100&quot; data-original-width=&quot;348&quot; height=&quot;92&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN2fVPPPXYys1SZdPlct7CYq1sMk5aKRnK9l8jwpmB9YE6iKZY1fzHT_E5zstFRfS-KoMT0M2R8p6ImIo3A6NqXKeLLyQbgpK4JisMdss2PLG3Y2SnTA5AKJgXxcVKlDDCC6J9YONbZIQxVuOAFFmz-0vMK9J7dANgHf1mkiQFmFqrimQJHxESJ0Gjm68/s320/Picture0.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The Institute of Electrical and Electronics Engineers (IEEE) has established a Medical Cybersecurity Certification Program that has been developed by the IEEE 2621 Conformity Assessment Committee (CAC), composed of stakeholders such as manufacturers, clinicians, FDA, test laboratories, cybersecurity solutions providers, and industry associations from around the world. The IEEE certification program is already applied to diabetes medical devices, and it will be extended to other devices. It provides:&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Insights and adherence based on global, consensus-based industry standards&lt;/li&gt;&lt;li&gt;Knowledge of FDA submission criteria&lt;/li&gt;&lt;li&gt;Adherence to best practices&lt;/li&gt;&lt;li&gt;Identifying ways to mitigate cyber attacks&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;atsec is proud to be recognized as the first IEEE-recognized testing laboratory with a primary location in Stockholm, Sweden, and secondary locations in Munich, Germany, and Austin, Texas, U.S. The very first IEEE 2621 assessments of the medical devices are ongoing and planned to be finalized in Q4 2023. &lt;br /&gt;&lt;br /&gt;“Over the years, atsec has been closely monitoring the development of security requirements in the medical device industry. When approached to become a lab for IEEE 2621, we enthusiastically. embraced the opportunity”,&amp;nbsp; said Salvatore La Petra, President and Co-Founder of atsec information security. &lt;br /&gt;&lt;/p&gt;&lt;p&gt;If you are interested in performing evaluation of your medical device or have any questions regarding our evaluation services, please do not hesitate to contact us (&lt;a href=&quot;mailto:info@atsec.com&quot;&gt;info@atsec.com&lt;/a&gt;). We look forward to working with you.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqyQDHdX2dzDH-MUNmBuQ1Zj0SgQvTUW6L8x6CqV1q1Y8whYOjb00ODzZQvh6OAMROhfdWcpULLkM-W9xH5bzO8EOpMJG9lLIR-8191XOwgplDfTyCJ-0r12PgcNk1rwCo4hYOVUYf6TY4HHiewbN4DTdo_QnUid0MGjcTWXbyB67XsTSQmUfAZqxZyTc/s1292/Picture1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;730&quot; data-original-width=&quot;1292&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqyQDHdX2dzDH-MUNmBuQ1Zj0SgQvTUW6L8x6CqV1q1Y8whYOjb00ODzZQvh6OAMROhfdWcpULLkM-W9xH5bzO8EOpMJG9lLIR-8191XOwgplDfTyCJ-0r12PgcNk1rwCo4hYOVUYf6TY4HHiewbN4DTdo_QnUid0MGjcTWXbyB67XsTSQmUfAZqxZyTc/w400-h226/Picture1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;i&gt;IEEE corporate advisory group (CAG) members visiting atsec AB in Stockholm, Sweden, earlier in 2023.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/8235074842343273199/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/cybersecurity-requirements-for-medical.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8235074842343273199'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/8235074842343273199'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/10/cybersecurity-requirements-for-medical.html' title='Cybersecurity Requirements for Medical Devices'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP2ahvbPYryoC0ZN8QeNZiyDKoFvtxOFtJo1TEHWLNKIHrYQSAGeISjWFy3DSS1wmjvR_ffZukcY7Jft8vrGjSJkcInwhH374JnzB9WtYc4antqR6GdlajKOfBXTEBipvzV5aEYq1rKvWq7FGO7S-Yc6k-03fR6hXtFyeWTg21bjGK6act5orBKl0s0nI9/s72-c/med-logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-2433472652400535449</id><published>2023-09-20T10:40:00.007-05:00</published><updated>2023-09-26T09:31:19.279-05:00</updated><title type='text'>The 11th International Cryptographic Module Conference</title><content type='html'>&lt;p&gt;The &lt;a href=&quot;https://icmconference.org&quot; target=&quot;_blank&quot;&gt;11th International Cryptographic Module Conference (ICMC)&lt;/a&gt; started today. This year the conference is held from September 20th to 22nd 2023 at the Shaw Center in Ottawa Canada.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4GmeNQ8fis6cHPwFft6HmmoIA86ohEHSrg_5xRRVZFYO4DULYb_EddoNg5Z2_7Z9WH-8ehqGlrkgcMN1k_9hV5A_e2hrYi6g5I8XLPnZgZ7pb00Fa48fa0hmbd_Y8e9OKF4gv_ASuQOQ3cTH4DKJPfP4i73PEwBlUpJmQROq_Cezj49HGMFl-_kCXMUE/s988/opening-speech.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;552&quot; data-original-width=&quot;988&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4GmeNQ8fis6cHPwFft6HmmoIA86ohEHSrg_5xRRVZFYO4DULYb_EddoNg5Z2_7Z9WH-8ehqGlrkgcMN1k_9hV5A_e2hrYi6g5I8XLPnZgZ7pb00Fa48fa0hmbd_Y8e9OKF4gv_ASuQOQ3cTH4DKJPfP4i73PEwBlUpJmQROq_Cezj49HGMFl-_kCXMUE/w400-h224/opening-speech.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The conference itself kicked off with Yi 
Mao, CEO of atsec US, giving the opening speech. It featured our latest 
animation, which has become somewhat of a tradition for us:&lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;autoplay; fullscreen; picture-in-picture&quot; frameborder=&quot;0&quot; height=&quot;349&quot; src=&quot;https://player.vimeo.com/video/864916383?h=3ee041d60d&amp;amp;badge=0&amp;amp;autopause=0&amp;amp;player_id=0&amp;amp;app_id=58479&quot; title=&quot;Shortening the FIPS Queue through Automation&quot; width=&quot;620&quot;&gt;&lt;/iframe&gt;&amp;nbsp; &lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Marcos Portnoi, Laboratory Director for atsec information security, wrote the welcome letter in this year&#39;s program:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;margin-left: 40px; text-align: left;&quot;&gt;&lt;i&gt;Dear Participants,&lt;br /&gt;&amp;nbsp;&lt;br /&gt;It is my utmost honor to welcome you to the International Cryptographic Module Conference 2023 in the beautiful city of Ottawa. This edition of ICMC marks the 10th anniversary of the conference, which was launched by atsec in September 2013 with the goal of bringing the community involved in cryptographic modules together.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;This year, we have over 90 presentations in nine tracks, including Certification Programs, Post-Quantum Cryptography, Random Bit Generators and Entropy, Crypto Technology, Payment Card Industry, Embedded/IoT, and Open-Source Cryptography. In this city founded on the power of trading and eventually becoming a technology hub, we will trade ideas and knowledge among members from industry, laboratories, government, academia: all of us who love a good talk about cryptography. And of course, since any sort of product this year needs to have a checkbox for Artificial Intelligence (AI)--and I mean any sort of product, from search engines to progressive corrective lenses to mattress softness regulators, and extra credit is granted if one can fit &quot;generative AI&quot; in the description--we also want to talk about it and we are bringing a panel with experts in AI to discuss the (hopefully concrete) applications of AI for our work.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;It is always interesting to witness the evolution in the conference among the years. Last year at the ICMC for instance, the Entropy Source Validation (ESV) was newly launched and Stateful Hash-Based Signatures (HBS), even though approved, had incipient implementations, still not testable via ACVP. Today, the ESV is at full throttle and HBS has one of its algorithms, LMS, now fully testable via ACVP and recently awarded a CAVP algorithm certificate.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One topic that particularly excites me is Post-Quantum Cryptography (PQC), and this year&#39;s ICMC has many interesting presentations in the track dedicated to PQC. The understanding and use cases of HBS have evolved substantially and the industry is better equipped to propose optimizations in the form through which those alluring yet brittle algorithms may be reviewed and evaluated for compliance with the standards. We see these initiatives in the very active Cryptographic Module User Forum (CMUF) working groups.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Again, my warmest welcome and may we enjoy our time!&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Marcos Portnoi, PhD.&lt;br /&gt;Laboratory&amp;nbsp; Director&lt;br /&gt;atsec information security corporation&lt;/i&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;We are proud to work with the &lt;a href=&quot;https://www.nccoe.nist.gov/automation-nist-cryptographic-module-validation-program&quot; target=&quot;_blank&quot;&gt;National Cybersecurity Center of Excellence (NCCoE)&lt;/a&gt; on shortening the FIPS queue through automation. Visit our colleagues at booth 200/202 to learn more.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;719&quot; data-original-width=&quot;1598&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnzwVdj6J_EsDDBzQJiuiYPIFM68JYcvRz7kkx05C8B2T54gGE_gmvMLCbR9tQ5oiywntCmWkOjIL_xJ_OH0TyO2J7zRM1L45C3vBstWintmEzhsPstTcFzNnxo7MENrUMPdQpuOZLTswt7Uah7ALFdijvUMJpdCV69R5monXKxWt8IEsC3leqbcnzdGk/w640-h288/atsec-team.jpg&quot; width=&quot;620&quot; /&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;This year, atsec colleagues are part of panel discussions and will be presenting on a variety of topics:&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EFP/EFT Testing at Security Level 3 and 4 and Remote Testing Advocacy&lt;/b&gt;&lt;br /&gt;Renaudt Nunez&lt;/li&gt;&lt;li&gt;&lt;b&gt;Panel: Facing the Future: The Next ISO/IEC 19790&lt;/b&gt;&lt;br /&gt;Yi Mao, et al.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Panel: Testing and Assessment for Quantum Safe Cryptography&lt;/b&gt;&lt;br /&gt;Marcos Portnoi, et al.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Kyber and Dilithium Real Life Lessons&lt;/b&gt;&lt;br /&gt;Stephan Mueller&lt;/li&gt;&lt;li&gt;&lt;b&gt;Equivalence Classes in AES&lt;/b&gt;&lt;br /&gt;David Cornwell&lt;/li&gt;&lt;li&gt;&lt;b&gt;Filling the Gaps in FIPS Cryptography&lt;/b&gt;&lt;br /&gt;Joachim Vandermissen&lt;/li&gt;&lt;li&gt;&lt;b&gt;Panel: Bringing Crypto Compliance and Validation Testing Objectives &lt;br /&gt;Together for FIPS 140-3&lt;/b&gt;&lt;br /&gt;Yi Mao, Stephan Mueller, et al.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Attestation and FIPS: Past, Present and Future&lt;/b&gt;&lt;br /&gt;Alessandro Fazio&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Marcos Portnoi is also hosting the  &lt;b&gt;Post-Quantum Crypto&lt;/b&gt; track.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;text-align: left;&quot;&gt;As always we are looking forward to interesting presentations, discussions and exchange between the vendors, labs, government entities and end users.&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/2433472652400535449/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/09/the-11th-international-cryptographic.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2433472652400535449'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/2433472652400535449'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/09/the-11th-international-cryptographic.html' title='The 11th International Cryptographic Module Conference'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4GmeNQ8fis6cHPwFft6HmmoIA86ohEHSrg_5xRRVZFYO4DULYb_EddoNg5Z2_7Z9WH-8ehqGlrkgcMN1k_9hV5A_e2hrYi6g5I8XLPnZgZ7pb00Fa48fa0hmbd_Y8e9OKF4gv_ASuQOQ3cTH4DKJPfP4i73PEwBlUpJmQROq_Cezj49HGMFl-_kCXMUE/s72-w400-h224-c/opening-speech.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-6258198441994662148</id><published>2023-09-11T15:28:00.039-05:00</published><updated>2023-09-12T11:05:46.356-05:00</updated><title type='text'>Artificial Intelligence in Evaluation, Validation, Testing and Certification</title><content type='html'>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;by Gerald Krummeck, atsec information security GmbH&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQT2prhclnYKm5Ct_4A2UaimKgqGuDlZl-CrceEZXTbwFbUPMLwM4vgcOngLd_5ZdiEs0rO-d5YMYoDaV9kjdaj0s3TIBb8P1qazLzD8SCK9mEqknXMBegB8lNapBIz4xCL8P-mlHaV46b9ICspbv0OHdsgSUExf-0PfnN84pv09nw2Y7DjciO21P6Aw/s450/thinker.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;445&quot; data-original-width=&quot;450&quot; height=&quot;317&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQT2prhclnYKm5Ct_4A2UaimKgqGuDlZl-CrceEZXTbwFbUPMLwM4vgcOngLd_5ZdiEs0rO-d5YMYoDaV9kjdaj0s3TIBb8P1qazLzD8SCK9mEqknXMBegB8lNapBIz4xCL8P-mlHaV46b9ICspbv0OHdsgSUExf-0PfnN84pv09nw2Y7DjciO21P6Aw/w320-h317/thinker.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Everybody seems to jump on the AI bandwagon these days, “enhancing” their products and services with “AI.” It sounds, however, a bit like the IoT hype from the last decade when your coffee machine desperately needed Internet access. This time, though, there’s also some Armageddon undertone, claiming that AI would make our jobs obsolete and completely transform all sorts of businesses, including ours.&lt;br /&gt;So, it comes as no surprise that atsec gets asked by customers, government agencies, and almost&amp;nbsp; everybody communicating with us how we position ourselves on the use of AI in our work and how we deal with AI being used in the IT security environment of our customers and in all sorts of other areas as well.&lt;br /&gt;First answer: Unfortunately, we don’t yet use it for authoring blog entries, so musing about the benefits and drawbacks of AI in our work still can ruin your weekend. &lt;span style=&quot;font-size: x-small;&quot;&gt;🙁&lt;/span&gt;&lt;br /&gt;Second answer: For an excellent overview of how we deal with AI and what we expect from this technology, there is a brilliant interview with Rasma Araby,&amp;nbsp; Managing Director&amp;nbsp; of atsec AB Sweden:&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/7SfHsQ4av-w?si=C3cIVNe4eS9fp9bs&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;Of course, AI is discussed within atsec frequently, as we are a tech company by nature. We analyze IT technologies for impacts on IT security and are eager to deploy new technologies for ourselves or introduce them to our customers if we believe they will be beneficial.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;atsec’s AI policy foundation&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDWFH8hXMJsKB6IgDsvVAZu1cXTP8Dif7cRMhQ9YExlKTaovTzATijolu2kFOpPgImHhSsprt57km0zC1lWQpzdHtlFxYoUI6cKSMaDb2SSgkHiOD_0K9a4LBNAokFm1fxkV5YIdcjeISwXzpuEqFtliWbgBMQ_XaKdDsAP-cq8ajxmMwtyDb4QBHatiw/s446/policy.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;445&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDWFH8hXMJsKB6IgDsvVAZu1cXTP8Dif7cRMhQ9YExlKTaovTzATijolu2kFOpPgImHhSsprt57km0zC1lWQpzdHtlFxYoUI6cKSMaDb2SSgkHiOD_0K9a4LBNAokFm1fxkV5YIdcjeISwXzpuEqFtliWbgBMQ_XaKdDsAP-cq8ajxmMwtyDb4QBHatiw/w319-h320/policy.png&quot; width=&quot;319&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;Recently, we defined some basic policies on the use of AI within atsec. Those policies have two cornerstones:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;First and foremost&lt;/b&gt;, we are committed to protecting&amp;nbsp; all sensitive information we deal with, especially any information entrusted to us by our customers. We will not share such information and data with third parties and thus will not supply any such information in publicly available AI tools.&lt;br /&gt;There are several reasons for this: Obviously, we would violate our NDAs with our customers if we send their information to a public server. Also, there is currently no robust way to establish trust in these tools, and nobody could tell you how such information would be dealt with. So, we must assume that we would push that information directly into the public domain. Even if we tried to “sanitize” some of the information, I would be skeptical that an AI engine would not be able to determine which customer and product our chat was about. The only way to find out would be to risk disaster, and we’re not in for that. Furthermore, sanitizing the information would probably require more effort than writing up the information ourselves.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The second cornerstone&lt;/b&gt; is not different from our use of any other technology: any technology is only a tool supporting&amp;nbsp; our work. It won’t take any responsibility for the results. &lt;br /&gt;We are using many tools to help our work, for example, to help us author our evaluation reports and to keep track of our work results, evidence database, etc.&amp;nbsp; Such tools could be marketed easily as AI, but as the saying goes: “A fool with a tool is still a fool.” Our evaluators take responsibility for their work products, and our quality assurance will not accept errors being blamed on a tool. Tools are always treated with a good dose of mistrust. We always have humans to verify that our reports are correct and to assume responsibility for their contents. This will not be different with an&amp;nbsp; AI tool. At atsec, our evaluators and testers&amp;nbsp; will always be in ultimate control of our work.&lt;br /&gt;With this framework, we are in a good position to embrace AI tools where they make sense and do not violate our policies. We are aware that we cannot completely avoid AI anyway, for example, when it “creeps” into standard software tools like word processors. AI-based tools helping our techies to re-phrase their texts for readability and better understanding might sometimes&amp;nbsp; be an improvement cherished by our customers. &lt;span style=&quot;font-size: x-small;&quot;&gt;😀&lt;/span&gt;&lt;br /&gt;We expect AI tools to help, for example, with code reviews and defining meaningful penetration tests in the foreseeable future . However, we currently do not encounter such tools that could be run in controlled, isolated environments to fulfill our AI policy requirements.&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Correctness of AI, trust in AI engines&lt;/b&gt;&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqfZiE4NJSzg3QfucT1MdUUmxvwrHIiFW8gH4mH3Sqm3all7OWKNnWdj75hNcnOyzijOUs9fFmbfZrEFuA9nzrwCD34pKFWVFJl0OM00jLLIcBV6oi3Y6fPnQujDwIZKKje1Y1IB8oomXETciZHOaEACSV9wxKZ5Qej5p6VE53V-lRdLrJcMqqWd-XSwQb/s451/truth.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;451&quot; data-original-width=&quot;444&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqfZiE4NJSzg3QfucT1MdUUmxvwrHIiFW8gH4mH3Sqm3all7OWKNnWdj75hNcnOyzijOUs9fFmbfZrEFuA9nzrwCD34pKFWVFJl0OM00jLLIcBV6oi3Y6fPnQujDwIZKKje1Y1IB8oomXETciZHOaEACSV9wxKZ5Qej5p6VE53V-lRdLrJcMqqWd-XSwQb/s320/truth.png&quot; width=&quot;315&quot; /&gt;&lt;/a&gt;&lt;/div&gt;As already stated, we do not treat current AI engines as trusted tools we can blindly rely upon. This is based on the fact that the “intelligence” displayed in the communication by these engines comes mostly from their vast input, which is absorbed into a massive network with billions, even trillions of nodes. Most of the large language models used in the popular AI engines are fed by the Common Crawl database of Internet contents (refined into Google’s Colossal Clean Crawled Corpus), which increases by about 20 terabytes per month. This implies that input for the training of the engines cannot be fully curated (i.e., fact-checked) by humans, and it leaves lots of loopholes to inject disinformation into the models. I&amp;nbsp; guess that every troll farm on the planet is busy doing exactly that.&lt;br /&gt;The developers of these AI engines try to fight this, but filtering out documents containing “dirty naughty obscene and otherwise bad words” won’t do the trick. If your favorite AI engine doesn’t have quotes from Leslie Nielsen’s “The Naked Gun” handy, that’s probably why. Checking the AI’s “Ground Truths” against Wikipedia has its shortcomings, too.&lt;br /&gt;Therefore, the AI engine companies use different benchmarks to test the AI engine output, with many of those outputs checked by humans. However, the work conditions of those “clickworkers” are often at a sweatshop level, which does not help to establish our trust in the accuracy and truthfulness of the results.&lt;br /&gt;Therefore, if atsec would use such engines in its core business of assessing IT products and technology, we would not be able to put a reasonable amount of trust in the output obtained from these engines and it would require us to fact-check each statement made by the AI. This might easily result in more effort than writing the reports ourselves and trusting our own judgment.&lt;br /&gt;Note that the accuracy of AI answers being between 60 and 80 percent depending on the subject tested in the benchmarks, together with the problems of poisoning the input, how to establish “truthfulness” of the AI, and ethical and philosophical questions about which information to provide are topics in the EU and US efforts to regulate and possibly certify AI engines. Unfortunately, while the problems are well known, their solutions are mostly not. AI researchers across the globe are busily working on those subjects, but my guess is that those issues may be intrinsic to today’s large language models and cannot be solved in the near future.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Offensive AI&lt;/h4&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEz7iUXMbWx-Zyh3Ev-x3oWMsn-dSzE_qj1VYd-CH4irPO6FxZR19suffMvvr8peaRlp0WdV9sKwXiVR9b8P0Vn5HXcqZYGM6K-8uXatCf6hsDX3T7zuMnGB9GnGkc4741PO-h7B4LbWb4OFc8Tl00R-Q7xHxAU5VZI3xQ7abpE8iWDuOlHSmdcp4_8qY/s447/correct.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;447&quot; data-original-width=&quot;444&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEz7iUXMbWx-Zyh3Ev-x3oWMsn-dSzE_qj1VYd-CH4irPO6FxZR19suffMvvr8peaRlp0WdV9sKwXiVR9b8P0Vn5HXcqZYGM6K-8uXatCf6hsDX3T7zuMnGB9GnGkc4741PO-h7B4LbWb4OFc8Tl00R-Q7xHxAU5VZI3xQ7abpE8iWDuOlHSmdcp4_8qY/s320/correct.png&quot; width=&quot;318&quot; /&gt;&lt;/a&gt;&lt;/div&gt;A common Armageddon scenario pushed by AI skeptics is that big AI engines like the ones from OpenAI, Microsoft, Google, Meta, and others will help the evil guys&amp;nbsp; find vulnerabilities and mount attacks against IT infrastructures much easier than ever. After almost 40 years in IT security, that doesn’t scare me anymore. IT security has been an arms race between the good and bad guys from the very beginning, with the bad guys having an advantage as they only need to find one hole in a product, while the good guys have the task of plugging all holes.&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;As history teaches us, the tools used by the bad guys can and will be used by the good guys too. Tools searching for flaws have been used by hackers and developers alike, although developers were at times more reluctant to adopt them. AI will be no different, and maybe it will help developers to write more robust code, for example, by taking on the tedious tasks of thorough input and error checking, which are still among the most prominent causes of software flaws. Will atsec deploy those tools as well for their evaluations and testing? While we will certainly familiarize ourselves with those tools and might add them to our arsenal, it will be much more beneficial for developers to integrate those tools in their development and test processes,&amp;nbsp; subjecting all of their code to that scrutiny as soon as the code is written or modified, rather than having a lab like atsec deploying those tools when the product may already be in use by customers.&lt;br /&gt;We have always advocated, in standards bodies and other organizations creating security criteria, that the search for flaws should be conducted within the developer’s processes and that the lab should verify that these searches for flaws and vulnerabilities are performed effectively in the development environment. This is also true for AI tools.&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h4&gt;&lt;p&gt;The hype about AI tools that started with the public availability of ChatGPT less than a year ago has already reached its “Peak of Inflated Expectations” (according to Gartner’s “hype cycle” model) and is on its way to the “Trough of Disillusionment.” The yet-to-come “Slope of Enlightenment” will lead to the “Plateau of Productivity,” when we finally have robust AI tools at our disposal, hopefully, combined with a certification that provides sufficient trust for their efficient deployment. In any case, atsec will monitor the development closely and offer to participate in the standardization and certification efforts. AI will become an integral part of our lives, and atsec is committed to helping make this experience as secure as possible.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/6258198441994662148/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/09/artificial-intelligence-in-evaluation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6258198441994662148'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/6258198441994662148'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/09/artificial-intelligence-in-evaluation.html' title='Artificial Intelligence in Evaluation, Validation, Testing and Certification'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQT2prhclnYKm5Ct_4A2UaimKgqGuDlZl-CrceEZXTbwFbUPMLwM4vgcOngLd_5ZdiEs0rO-d5YMYoDaV9kjdaj0s3TIBb8P1qazLzD8SCK9mEqknXMBegB8lNapBIz4xCL8P-mlHaV46b9ICspbv0OHdsgSUExf-0PfnN84pv09nw2Y7DjciO21P6Aw/s72-w320-h317-c/thinker.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-4749828194363409339</id><published>2023-08-18T13:51:00.003-05:00</published><updated>2023-08-28T11:58:05.809-05:00</updated><title type='text'>Entropy Source Validation (ESV) Certificate Issued for the Intel DRNG</title><content type='html'>&lt;span style=&quot;font-size: x-small;&quot;&gt;by Marcos Portnoi
&lt;/span&gt;&lt;p&gt;Recently the CMVP has granted ESV certificate #E57 to the Intel DRNG entropy source. The testing and submission was done by atsec and it marks the first ESV certificate granted to the Intel DRNG.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-EUOg9cX5MzocHEEUYgHFraD1-5FmacLuGJNOPJ0rTjmczl_0vD330lGTA-CR8JC1QPsENaL7ctUkV3yRRI4AftUDihqABRo5WIrApJJiNT2tF1y17cjEy29xNj6wRs9SLRpM0gaGAXsyRS0sL4UnPRV918N9cXYfLDCYfrrXgAxVK_5Sox4kHLV0Kx8/s295/1.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;295&quot; data-original-width=&quot;293&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-EUOg9cX5MzocHEEUYgHFraD1-5FmacLuGJNOPJ0rTjmczl_0vD330lGTA-CR8JC1QPsENaL7ctUkV3yRRI4AftUDihqABRo5WIrApJJiNT2tF1y17cjEy29xNj6wRs9SLRpM0gaGAXsyRS0sL4UnPRV918N9cXYfLDCYfrrXgAxVK_5Sox4kHLV0Kx8/w231-h232/1.png&quot; width=&quot;231&quot; /&gt;&lt;/a&gt;The Intel DRNG (Digital Random Number Generator) is a hardware Random Bit Generator (RBG) integrated into a multitude of Intel processors, and offers both an entropy source and an SP800-90A DRBG to users of the processors. The DRNG is commonly accessed through the well-known RDRAND and RDSEED processor instructions. There is massive use of those instructions, such as in the Linux kernel, and the ESV certificate is a key step in facilitating the use of the entropy source in FIPS 140-3 validated modules.&lt;/p&gt;&lt;p&gt;Intel Corporation commented: &lt;i&gt;&quot;Today&#39;s US Government Cyber Security standards are highly complex. With the increasingly critical urgency for better security for cryptographic products comes the need for greater technical expertise along with the ability to navigate government standards. Despite extremely complex designs, atsec collaborated with Intel Corporation to obtain Intel&#39;s first Entropy Source Validation certificate which can be &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/57&quot; target=&quot;_blank&quot;&gt;viewed on the NIST website&lt;/a&gt;.&quot; &lt;/i&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The design of the Intel DRNG includes compliance with SP800-90A, SP800-90B and the upcoming new version of SP800-90C.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The ESV certificate covers the components compliant with SP800-90B. 

The ESV program rolled out in April 2022 and facilitates validation through two key points: confering a certificate exclusively for the entropy source, allowing for the reuse of validated entropy sources by multiple module validations; and facilitating the validation process by providing an automated process and protocol, similar to the Automated Cryptographic Validation Protocol (ACVP). The CMVP has been reviewing the ESV submissions in a relatively quick cycle of about 6 weeks, including submission, review, comments and certification. The talented technical personnel of the CMVP are engaged in the review process, producing interesting comments, and in the dynamic evolution of the ESV program.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;The certificate is available at &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/57&quot; target=&quot;_blank&quot;&gt;https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/57&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/4749828194363409339/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/08/entropy-source-validation-esv.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4749828194363409339'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/4749828194363409339'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/08/entropy-source-validation-esv.html' title='Entropy Source Validation (ESV) Certificate Issued for the Intel DRNG'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-EUOg9cX5MzocHEEUYgHFraD1-5FmacLuGJNOPJ0rTjmczl_0vD330lGTA-CR8JC1QPsENaL7ctUkV3yRRI4AftUDihqABRo5WIrApJJiNT2tF1y17cjEy29xNj6wRs9SLRpM0gaGAXsyRS0sL4UnPRV918N9cXYfLDCYfrrXgAxVK_5Sox4kHLV0Kx8/s72-w231-h232-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-1099688150763110512</id><published>2023-07-20T08:02:00.001-05:00</published><updated>2023-07-20T08:02:00.138-05:00</updated><title type='text'>First Post-Quantum Algorithm Certificate issued by CAVP</title><content type='html'>&lt;p&gt;


















&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;By Joachim Vandersmissen&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;img border=&quot;0&quot; data-original-height=&quot;239&quot; data-original-width=&quot;832&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipeFPvTNrf3_koWky4tOHyuyEZVa68Bd4upLbBUI0GsDKzv4L_7k0hDBlbDRKvDT1LuFYKjwtCfCT6dQ-XGx4CUNuqFu5HetHBJnjr0R2BZ_42V0y_s8oOGI0OPaoGoa-WMDM8jtAFk_JqjyRjVlys3BRUXb01U8y-bELOq0zsYFBFFLbM3CQj7SW6wsk/w640-h184/merkle.png&quot; width=&quot;620&quot; /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;On July 14, atsec obtained the first validation certificate
for a post-quantum cryptographic algorithm: &lt;a href=&quot;https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16745&quot;&gt;A4204&lt;/a&gt;.
We used the Automated Cryptographic Validation Protocol (ACVP) to verify the
correctness of the LMS (Leighton-Micali Signature) key pair generation,
signature generation, and signature verification implementations in the QASM
Hardware Security Module, developed by Crypto4A Technologies. This milestone
represents an important step in the ongoing transition from traditional
public-key cryptography to quantum-resistant algorithms.&lt;/p&gt;



&lt;p class=&quot;MsoNormal&quot;&gt;The LMS scheme is a digital signature scheme based on secure
hash functions and Merkle trees. It was first published in 1995 by Leighton and
Micali and is based on the famous one-time signature scheme proposed by Lamport
in 1979. Among quantum-resistant public-key algorithms, these schemes provide a
distinct advantage: the post-quantum security of the scheme relies exclusively
on the security of the underlying hash function. No other number-theoretic
hardness assumptions are required. This is very attractive, as all modern hash
functions with an output size of more than 256 bits are believed to be quantum safe.
However, there are also drawbacks. In particular, LMS is a stateful signature
scheme. In other words, it maintains an internal state that must be protected
in hardware. Still, the benefits of hash-based cryptography significantly
outweigh the costs, which lead to LMS (and XMSS) being standardized by NIST in
2020 (&lt;a href=&quot;https://csrc.nist.gov/publications/detail/sp/800-208/final&quot;&gt;SP
800-208&lt;/a&gt;).&lt;/p&gt;



&lt;p class=&quot;MsoNormal&quot;&gt;In May 2022, SP 800-208 was added to &lt;a href=&quot;https://csrc.nist.gov/publications/detail/sp/800-140c/rev-1/final&quot;&gt;SP
800-140C&lt;/a&gt;, which specifies the algorithms approved for usage in FIPS 140-3
cryptographic modules. This also paved the way for LMS and XMSS to be tested by
the &lt;a href=&quot;https://csrc.nist.gov/Projects/cryptographic-algorithm-validation-program/&quot;&gt;Cryptographic
Algorithm Validation Program&lt;/a&gt; (CAVP). The CAVP verifies the correct
implementation of cryptographic algorithms and their components. Initial
support for the LMS scheme was added in March 2023 and made available for
production usage in April. We would like to thank the CAVP for their diligent
work and excellent support to make this achievement possible.&lt;/p&gt;



&lt;p class=&quot;MsoNormal&quot;&gt;Quantum computers represent a significant risk to classical
public-key cryptography, a risk which cannot be ignored. Last year, the
Commercial National Security Algorithm (CNSA) Suite 2.0 was published, which
envisions a complete transition to post-quantum cryptography by 2033. We
applaud Crypto4A Technologies for its proactive approach to offer this
quantum-resistant signature scheme to its customers well ahead of the deadline.&lt;/p&gt;





&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/1099688150763110512/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/07/first-post-quantum-algorithm.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/1099688150763110512'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/1099688150763110512'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/07/first-post-quantum-algorithm.html' title='First Post-Quantum Algorithm Certificate issued by CAVP'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipeFPvTNrf3_koWky4tOHyuyEZVa68Bd4upLbBUI0GsDKzv4L_7k0hDBlbDRKvDT1LuFYKjwtCfCT6dQ-XGx4CUNuqFu5HetHBJnjr0R2BZ_42V0y_s8oOGI0OPaoGoa-WMDM8jtAFk_JqjyRjVlys3BRUXb01U8y-bELOq0zsYFBFFLbM3CQj7SW6wsk/s72-w640-h184-c/merkle.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6042572809285034351.post-9004209824198617456</id><published>2023-07-17T11:35:00.002-05:00</published><updated>2023-07-18T09:51:07.395-05:00</updated><title type='text'>The IoT Security Global Certification Challenges</title><content type='html'>&lt;span style=&quot;font-size: x-small;&quot;&gt;by Rasma Araby&lt;/span&gt;&lt;p&gt;&lt;a href=&quot;https://www.mobileworldlive.com/gsma-m360-uk-mobile-security-and-industries/security-experts-call-for-improved-device-standards/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;385&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhICMdvUB7RoMr2ax0xx85A97KylYYZ4GR64bqe_OoGigmrvJfs-Q0J8Tfn5yFlXNRG98DdBHPjdmNvZLyC86yl9-3vP3lb2NGXmKS5T8XZ5yUWCLM7d-RF-tsxRXyGq433ifLE2rbADXPGeiHGo5ZZWDOn0rBwO6zVYecjvjxvtqANe9EwU93djhy5Wnk/w640-h386/paper.png&quot; width=&quot;620&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;In today&#39;s interconnected world, the Internet of Things (IoT) has become an integral part of our daily lives. From smart homes to industrial automation, IoT devices are revolutionizing various industries. However, with this increased connectivity comes the need for robust security measures to protect sensitive data and ensure the integrity of these devices.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The Importance of IoT Security&lt;/b&gt;&lt;br /&gt;As IoT devices continue to proliferate, the potential risks and vulnerabilities associated with them also increase. These devices collect and transmit vast amounts of data, making them attractive targets for cybercriminals. A breach in IoT security can have severe consequences, ranging from privacy breaches to physical harm.&lt;br /&gt;Ensuring the security of IoT devices requires a comprehensive approach that includes both hardware and software security measures. One crucial aspect of IoT security is certification.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The Role of Certification in IoT Security&lt;/b&gt;&lt;br /&gt;Certification plays a vital role in establishing trust and confidence in IoT devices. It provides assurance that a device meets specific security standards and has undergone rigorous testing to identify and mitigate potential vulnerabilities. However, achieving global certification for IoT devices poses several challenges.&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Diverse Regulatory Landscape&lt;br /&gt;The IoT industry operates on a global scale, and different countries have varying regulations and standards for IoT security. Obtaining certification that complies with multiple regulatory frameworks can be a complex and time-consuming process for manufacturers.&lt;/li&gt;&lt;li&gt;Rapidly Evolving Threat Landscape&lt;br /&gt;Cyber threats are constantly evolving, and new vulnerabilities are discovered regularly. IoT devices need to be certified not only at the time of their release but also throughout their lifecycle to address emerging threats. This requires manufacturers to stay updated with the latest security standards and continuously update their devices accordingly.&lt;/li&gt;&lt;li&gt;Lack of Standardization&lt;br /&gt;While there are existing security standards for IoT devices, there is still a lack of global standardization. Different certification bodies may have different criteria and processes, making it challenging for manufacturers to navigate the certification landscape.&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Addressing the Challenges&lt;/b&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;To overcome the challenges associated with global certification for IoT security, collaboration between industry stakeholders, regulatory bodies, and certification organizations is crucial. Here are some steps that can be taken: &lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Harmonization of Standards: Efforts should be made to harmonize security standards across different regions to streamline the certification process.&lt;/li&gt;&lt;li&gt;Continuous Monitoring and Updates: Certification bodies should establish mechanisms to monitor and update certified devices to address emerging threats.&lt;/li&gt;&lt;li&gt;Education and Awareness: Manufacturers should be educated about the importance of certification and the steps involved in the process.&lt;/li&gt;&lt;li&gt;International Collaboration: Collaboration between regulatory bodies and certification organizations from different countries can help establish a unified approach to IoT security certification.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;As the IoT continues to expand, ensuring the security of connected devices is of paramount importance. Global certification plays a crucial role in establishing trust and confidence in IoT devices. However, the challenges associated with certification need to be addressed through collaboration and standardization efforts.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimxF1lq1F2SFxQYzQ8a7MLtiAGV97C2iQizk2WaZjoRrm2A2XOHuO6Q3f6NTKTPMj_LRpK34etthuVlMsw3n5pumbCgqU7CX9q52NCTyv1G4XMsplF0TDZhuEGSpI-jLhwkVYzQSsoqb9LBDQxudkGy4LoVwBwsJVVss_YVRe_vZU9VMtnI4UBlgn_pp4/s118/gsma.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;118&quot; data-original-width=&quot;118&quot; height=&quot;118&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimxF1lq1F2SFxQYzQ8a7MLtiAGV97C2iQizk2WaZjoRrm2A2XOHuO6Q3f6NTKTPMj_LRpK34etthuVlMsw3n5pumbCgqU7CX9q52NCTyv1G4XMsplF0TDZhuEGSpI-jLhwkVYzQSsoqb9LBDQxudkGy4LoVwBwsJVVss_YVRe_vZU9VMtnI4UBlgn_pp4/s1600/gsma.png&quot; width=&quot;118&quot; /&gt;&lt;/a&gt;&lt;/div&gt;IoT security was a pivotal discussion point covered at the GSMA M360 UK Mobile Security and Industries conference that took place on July 11-12, 2023. The GSMA M360 UK brought together industry security professionals to share best practice and industry corporation for enhanced security. Rasma Araby participated in the panel discussion “The security dynamics of the IoT ecosystems” and shared her insight on security requirements and certification of the IoT devices. Please see more information provided in the article &lt;a href=&quot;https://www.mobileworldlive.com/gsma-m360-uk-mobile-security-and-industries/security-experts-call-for-improved-device-standards/&quot; target=&quot;_blank&quot;&gt;published by Mobile World Live&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://atsec-information-security.blogspot.com/feeds/9004209824198617456/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://atsec-information-security.blogspot.com/2023/07/the-iot-security-global-certification.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/9004209824198617456'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6042572809285034351/posts/default/9004209824198617456'/><link rel='alternate' type='text/html' href='http://atsec-information-security.blogspot.com/2023/07/the-iot-security-global-certification.html' title='The IoT Security Global Certification Challenges'/><author><name>atsec information security</name><uri>http://www.blogger.com/profile/07518170260671162983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhICMdvUB7RoMr2ax0xx85A97KylYYZ4GR64bqe_OoGigmrvJfs-Q0J8Tfn5yFlXNRG98DdBHPjdmNvZLyC86yl9-3vP3lb2NGXmKS5T8XZ5yUWCLM7d-RF-tsxRXyGq433ifLE2rbADXPGeiHGo5ZZWDOn0rBwO6zVYecjvjxvtqANe9EwU93djhy5Wnk/s72-w640-h386-c/paper.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>