By Topic

Integrating cryptography into trusted systems: A criteria approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
W. Brierley ; Commun. Security Establ., Ottawa, Ont., Canada

The rationale behind the requirements for cryptographic implementations which have been integrated into version 3.0 of the Canadian trusted computer products evaluation criteria (CTCPEC) are presented. It is argued that an integrated set of requirements for cryptography is an essential step toward bridging the gulf between communications and computer security. A brief overview of the CTCPEC is given, with particular emphasis on those features of the CTCPEC which facilitated the development of security requirements for cryptographic modules. The scope of the security requirements for cryptographic modules and the structure of the security requirements document are discussed. The requirements on the implementation of a cryptographic module are addressed. The requirements for the integration of cryptographic modules into INFOSEC products are described. A summary of the project is provided

Published in:

Computer Security Applications Conference, 1992. Proceedings., Eighth Annual

Date of Conference:

30 Nov-4 Dec 1992