[go: up one dir, main page]

0% found this document useful (0 votes)
3 views3 pages

ReportTask 1

Uploaded by

Aqib khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

ReportTask 1

Uploaded by

Aqib khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Task 1: Comparison of FIPS 140-2, FIPS 140-3, and Common Criteria

1. Introduction

Security standards play a crucial role in ensuring the integrity, confidentiality, and
availability of information systems. This report compares FIPS 140-2, FIPS 140-3,
and Common Criteria (CC)—three widely recognized security evaluation frameworks.

2. FIPS 140-2 (Federal Information Processing Standard 140-2)

Overview

• Published by NIST (National Institute of Standards and Technology) in 2001.

• Defines security requirements for cryptographic modules used in government and


private sectors.

• Focuses on four security levels (Level 1 to Level 4), with increasing security
assurance.

Key Features

• Level 1: Basic security (e.g., encryption algorithms).

• Level 2: Adds role-based authentication and tamper-evident seals.

• Level 3: Requires physical tamper resistance and identity-based authentication.

• Level 4: Highest level, protecting against environmental attacks.

Limitations

• Lacks modern cryptographic algorithms (e.g., SHA-3, AES-256).

• Does not fully address side-channel attacks.

3. FIPS 140-3 (Federal Information Processing Standard 140-3)

Overview

• Released in 2019 as an update to FIPS 140-2.

• Aligns with ISO/IEC 19790:2012 for international consistency.

• Enhances testing methodologies via CMVP (Cryptographic Module Validation


Program).

Key Improvements Over FIPS 140-2


• Stronger cryptographic requirements (e.g., post-quantum resistance
considerations).

• Enhanced physical security (e.g., advanced tamper detection).

• More rigorous testing (e.g., side-channel attack resistance).

• Software/firmware integrity checks (e.g., secure boot).

Security Levels (Same as FIPS 140-2 but Enhanced)

• Level 1: Minimal security.

• Level 2-4: More stringent requirements for authentication, physical security, and
environmental failure testing.

4. Common Criteria (CC) for Information Security Evaluations

Overview

• An international standard (ISO/IEC 15408) for evaluating IT security products.

• Uses Protection Profiles (PPs) and Security Targets (STs) for assessments.

• Provides Evaluation Assurance Levels (EAL 1-7), where higher levels mean stricter
testing.

Key Components

• Security Functional Requirements (SFRs): Defines security capabilities (e.g.,


access control, audit logging).

• Security Assurance Requirements (SARs): Ensures correct implementation.

• Certification Process: Conducted by accredited labs (e.g., NIAP in the U.S.).


Comparison with FIPS 140-2/3

Feature FIPS 140-2 FIPS 140-3 Common Criteria

Cryptographic Cryptographic Broad IT security


Scope
modules modules products

Security Levels 1-4 1-4 EAL 1-7

Enhanced crypto &


Encryption & Comprehensive
Focus side-channel
physical security security evaluation
resistance

International ISO/IEC 15408


U.S. standard Aligns with ISO 19790
Alignment (Global)

Testing EAL-based
CMVP validation CMVP + ISO 19790
Methodology evaluation

5. Conclusion

• FIPS 140-2/3 are specialized for cryptographic modules, with FIPS 140-3 being more
modern.

• Common Criteria is broader, covering diverse IT security products with flexible


assurance levels.

• Organizations handling sensitive government data may require FIPS validation,


while enterprise security products often seek Common Criteria certification.

You might also like