Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
A laboratory is an organization which operates a quality system, has technical competence, generates valid results and its quality system and technical competence are conformed and recognized. A cryptology laboratory operates in information technology security area, where cryptographic methods of information protection play main role. Appropriate confidence, correctness and effectiveness of security services is needed and may be achieved trough development, evaluation, accreditation and certification processes performed by competent and commonly recognized organizations like: laboratories, certification and accreditation bodies. We describe in the paper the accreditation and certification structure and the IT security framework and also the role of the cryptology laboratory in this structure and framework.
Rocznik
Tom
Strony
58--63
Opis fizyczny
Bibliogr. 10 poz., il.
Twórcy
autor
- Military Communication Institute, 05-130 Zegrze, Poland, wicik@wil.waw.pl
Bibliografia
- [1] „General requirements for the competence of testing and calibration laboratories", ISO/IEC 17025 Standard, 1999.
- [2] „ITSEC (and ITSEM) - Information Technology Security Evaluation Criteria (and Methodology)", United Europe Commission, 1991-1993.
- [3] „CC (and CEM) - Common Criteria (and Evaluation Methodology) for Information Technology Security Evaluation", ISO/IEC 15408 Standard, 1999.
- [4] „UK Scheme Publications - UK IT Security Evaluation and Certification Scheme", Certification Body - CESG, Cheltenham, UK, 1999-2002.
- [5] „Quality Manual and Procedures Manuals of Cryptology Laboratory", Military Communication Institute, Zegrze, 2002-2004.
- [6] J. Pieprzyk, T. Hardjono, and J. Seberry, Fundamentals of Computer Security. Berlin: Springer-Verlag, 2003.
- [7] A. Menezes , P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton Florida: CRC Press, 1996.
- [8] R. Wicik, „Properties of a block cipher based on extended Feistel network with large S-boxes", in Proc. Conf. RCMCIS'2000, Zegrze, Poland, 2000.
- [9] R. Wicik, „The statistical test for determining independence of pseudorandom bit sequences used in cryptographic systems", in Proc. Conf. RCMCIS'01, Zegrze, Poland, 2001.
- [10] M. Borowski and R. Wicik, „How to speed up a stream cipher", in Proc. Conf. RCMCIS'02, Zegrze, Poland, 2002.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT3-0013-0010
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.