This presentation will describe recent progress on supersingular isogeny-based cryptography and our efforts to make it practical for real-world use. Abstract: Supersingular isogeny Diffie-Hellman (SIDH) has rapidly become one of... Read More
In this talk we will discuss the methodology of cryptography lifecycle management which helps organizations to identify cryptographic threats, transition to a crypto agile system and to be prepared for... Read More
An in-depth look at the real-world process of validation with input from professionals who have hands-on experience at each step. Includes a case study of an actual validated CM product.
In this course, we will review the main hardware attack families to integrated circuits (IC), from the physical manipulation of the IC and probing techniques to side channel analysis and... Read More
Physical Testing requirements are defined in section 5 of FIPS 140-2. Additional guidance is provided by the implementation guidance. This Workshop will detail the physical testing requirements for each security... Read More
The recent rise in the price of bitcoin created renewed interest in the underlying technology that drives bitcoin called blockchain. Although there is a lot of interest and potential in... Read More
NIST is working in close collaboration with the industry to address the shortcomings of the NIST Cryptographic Validation Programs and improve the efficiency and effectiveness of cryptographic module testing in... Read More
This presentation will introduce the major test technology development trends of KCMVP. Korea has been operating its own cryptographic module validation system since 2005 and has been conducting tests based... Read More
The Federal Information Processing Standard (FIPS) 140-2 was published at a time when the full operational environment, from the cryptographic module to the processor, was definable, self-contained, and controlled by... Read More
The speaker will provide an overview and update of the current state of quantum computers and the threat they pose to cryptographic systems. He will discuss progress in preparing cryptographic... Read More
This presentation will introduce the new Canadian Centre for Cyber Security (CCCS or Cyber Centre), a branch of the Communication Security Establishment (CSE). We’ll focus on who we are in... Read More
Update to the CMUF Working Group, FIPS in the Cloud. The working group was formed to create a pathway for vendors and labs to validate FIPS modules in 3rd party... Read More
After about one-year analysis and evaluation on the first-round candidates, NIST announced the second-round candidates in January 2019. In this presentation, we will provide a summary on the second-round candidates... Read More
With the explosive growth of Internet of Things coupled with 5G communications and re-utilization of GSM 200kHz band for localized IoT applications, industry is going forward with massive investments in... Read More
Cryptography is facing new challenges with new technologies such as IoT, Cloud, Quantum Cryptography etc. As the number of secure connections are exponentially increasing, key generation, strength of keys are... Read More
Isogeny-based cryptography or more specifically supersingular isogeny Diffie-Hellman (SIDH) has recently received considerable attention form quantum-safe research community. A highly secure model of that, a.k.a supersingular isogeny key encapsulation (SIKE)... Read More
Driven by digitalisation of “everything”the trust in digital devices of all types and their authenticity and integrity becomes a critical factor for the success of new offerings and business models.... Read More
Cloud is a fantastic buzzword. Everybody knows about it and only a few knows about the mechanics. In this presentation we will analyze the current progress of the industry on... Read More
This presentation will provide the latest from the CMVP: from new and updated Implementation Guidance to lab accreditation changes, and all initiatives in between.
qTESLA is a simple and highly-efficient signature scheme whose security, based on the Ring-Learning With Errors (R-LWE) problem, is conjectured to thwart quantum computer attacks [1][2]. For example, qTESLA signatures... Read More
A non-volatile DIMM (NVDIMM) is a Dual In-line Memory Module (DIMM) that maintains the contents of Synchronous Dynamic Random Access Memory (SDRAM) during power loss. An NVDIMM-N class of device... Read More
The NISTIR 8200 report addresses the growing need to develop effective security standards for the Internet of Things (IoT). They have identified a wide range of critical categories impacted by... Read More
The NIST Special Publication (SP) 800-90 series of recommendations provide guidance on the construction and validation of random bit generators in the form of deterministic random bit generators or non-deterministic... Read More
IG G8 details the criteria that a module must meet in order to be submitted under one of the revalidation submission scenarios. According to IG G8, a module with security... Read More
Secure Architectures of Future Emerging Cryptography (SAFEcrypto) aims to provide a new generation of practical, robust and physically secure post-quantum cryptographic solutions that ensure long-term security for future ICT systems,... Read More
Internet of Things (IoT) ecosystems have become increasingly prevalent, fundamentally changing the way we live, work and play. Billions of IoT devices already exist, with hundreds more coming online each... Read More
NIST is working in close collaboration with the industry to address the shortcomings of the NIST Cryptographic Validation Programs and improve the efficiency and effectiveness of cryptographic module testing in... Read More
Representation of protocols such as TLS, SSH and IPsec vary widely in the Security Policies for modules validated to FIPS 140-2. This presentation covers associated guidance, representation of ciphersuites (and... Read More
The automotive industry has rapidly evolved in recent times in such a way that the cars have been transformed from a simple mode of transport to the ultimate mobile device.... Read More
In August 2017 a new version 1.3 of the Transport Layer Security (TLS) protocol which is a secure protocol for transporting data between devices and across the internet was released.... Read More
The importance of connected devices, services, and platforms in modern society is growing rapidly, and nowhere is this more apparent than the smart city. Made up of a wide range... Read More
A cryptographic module is often thought as a black box delivering a cryptographic service (e.g. encryption/decryption, authentication, key generation): it is implicitly assumed that what happens inside the cryptographic module... Read More
Cloud is becoming a dominant tool for various government agencies. Hence securing the cloud has become a paramount task. FedRamp is US standard for clouds. In spite of FedRamp enforcement,... Read More
This keynote will focus on sharing some of the successes and opportunities in achieving SDL (Security Development Lifecycle) at a large enterprise software vendor with a multitude of offerings. It... Read More
This presentation will give a very brief introduction to Arm Platform Security Architecture (though that is a separate submission) and then explains why Arm have decided to introduce a new... Read More
TLS (formerly SSL) is fairly well known, and most people are familiar with it through the ‘s’ at the end of the ‘https’ in web URLs. Securing communication is also... Read More
NIST announced that the transition from the legacy CAVS cryptographic testing tool to ACVP would likely happen in the beginning of 2019. The transition involves a new method of communication... Read More
The FIDO Alliance, a 250+ member association developing specifications and certification programs for simpler, stronger authentication, announced back in March 2018 the expansion of its certification program to include multi-level... Read More
Recently, the self-test related IGs 9.1, 9.11 and 9.12 have been updated to reduce the number of tests performed during power on to help improve module performance. At the same... Read More
The objective of this presentation will be to provide an update from the CMUF Security Policy Working Group. This talk will present “near” final versions of example Level 2 hardware... Read More
We are becoming increasingly ‘digitally dependent’, with connectivity spanning from our Edge devices, through the Fog and into the Cloud, helping us to manage every aspect of our personal, business... Read More
With the lines between enterprise key managers and hardware security modules being continually blurred or at worst, not well understood, it is easy to see two of our leading industry... Read More
You embark on the exciting journey of building a brand spanking new security hardware device. You require Fips 140-2 certification before deploying your device to the market place, everyone needs... Read More
Many security certification schemes exist and are a useful tool to check compliance or conformity to certain security criteria ideally nailed down in standards. However, the processes involved usually require... Read More
This presentation will discuss the following problems: * Not all certification levels fit * How do you include HW/SW/Edge/Cloud? * Patching security issues * How do you re-use from 1... Read More
From its humble beginnings storing keys for encrypted data stored on disk and tape, encryption key management has come a long way with the availability of a stable and widely... Read More
The OpenSSL 1.0.2 distribution that supports a FIPS 140-2 validated module will not be supported by the OpenSSL Management Committee past 2019. A new FIPS 140 module that supports TLS... Read More
Crypto Done Right (https://cryptodoneright.org) is a research project under development at Johns Hopkins funded by a grant from Cisco. We introduced the project at ICMC 2018. The goal of the... Read More
At some point during the development and validation of a cryptographic module, it is expected that the vendor’s certification expert(s) will have to perform at least one review of the... Read More
This presentation describes a user’s perspective on management of entire application stack with certified components, involving both FIPS hardware and Common Criteria applications on top. Further, we discuss how this... Read More
The recent NIST publications of new versions of the key establishment standards formed a complicated landscape for the CMVP, the implementers, and testers. The standards keep evolving, the new parameter... Read More
The purpose of this presentation is to establish the importance of a vulnerability management framework in an organisation. Presenters will walk through Gemalto’s vulnerability management process as a part of... Read More
Mandated in 2018, eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation defining standards for electronic signatures, qualified digital certificates, electronic seals, timestamps and other proof of authentication... Read More
No one doubts that the handwritten signature will eventually be replaced by the digital signature. The European union is evolving towards new regulations for these systems based on certification. New... Read More
This presentation will compare and contrast the concepts of encryption key management and encryption key vaulting citing specific examples and drawing on the speakers experience with the two relevant industry... Read More
As more limits get introduced on the use of reflection in Java, Java 9 saw the introduction of multi-release jar files. These class archive files allow a JVM to dynamically... Read More
Data encryption, advanced authentication, digital signing and other cryptography-based security functions have come to play a vital role in organizations’ cybersecurity and regulatory compliance initiatives. To secure their digital assets... Read More
Equivalence Working Group Mission statement The Equivalence Working Group will work toward formulating recommendations, in the form of a draft Implementation Guidance (IG), which the CMVP finds acceptable to justify... Read More
Standard AES encryption of data provides confidentiality, but inhibits operations such as addition and comparison of ciphertexts. Baffle has developed a cryptographic technology using AES that allows data operations on... Read More
Over the past few years, assessment of compliance of products and services with the eIDAS regulation has been at the center of extensive debate. Product developers, service providers, certification authorities,... Read More
This is a joint presentation made by Paul Yang for BaishanCloud and Zhenlong Zhao from TrustChain. In this presentation, we would like to introduce the cutting-edge blockchain open source projects... Read More
The computer security Division at the National Institute of Standards and Technology is taking steps toward the standardization of threshold schemes for cryptographic primitives. These schemes have the potential to... Read More
The Red Hat Enterprise Linux 8 brings a concept of system-wide cryptographic policies which allow easy selection of allowed cryptographic algorithms and protocols that apply to all the core cryptographic... Read More
If encrypted data safeguards privacy, why do so few organizations and individuals encrypt their data? Encryption must be usable for widespread adoption. I’ll introduce the four principles of usable encryption... Read More
The session will look at how, among all of the practices and controls, cryptography acts as the nuts and bolts of security and why there would be very little Confidentiality,... Read More
This presentation will provide an overview of testing deemed necessary in FIPS and a summary of the challenges and opportunities for re-use in other Certifications based on lessons learned from... Read More
When implementing TLS 1.3 using a straightforward design for an HKDF interface in NSS, presenters ran into a number of issues that needed to be solved, particularly when running in... Read More
In an SP800-90B assessment, the vendor must determine if their noise source supports an IID assumption, and justify any claim that the source output is IID. The SP800-90B IID assessment... Read More
ISO/IEC 19790 provides the security requirements for a cryptographic module. Originally based on the U.S. FIPS 140-2, the ISO version has been further developed and improved in subsequent editions. The... Read More
Security of a virtual platform begins with a “Chain of Trust.” The trust chain means that a suitable trust anchor is used to validate the first software component launched, and... Read More
One of the major challenges in any distributed computing system is the availability of proper computing devices, i.e., powerful enough to accomplish the assigned tasks. This issue might be resolved... Read More
With the advent of the Internet of Things (IoTs), all kinds of modern electrical devices such as smart phones, medical devices, network sensors as well as traditional computing platforms are... Read More
In order to improve the security of the Internet of Things, Arm are developing PSA to provide a secure platform for building devices. The PSA includes design principles and a... Read More
One of the mandatory steps during FIPS module initialization is performing of Integrity Checking. Usually such checking does not cause any difficulties and can be easily addressed by well-known approaches.... Read More
Cryptography is almost in all IT products providing security. As such, the evaluation of the cryptographic code is part of a Common Criteria evaluation. On the other side, in a... Read More
Over the last several years, both CMVP and NIAP have been reducing the number of similar CPUs covered by a single CAVS test. Historically, an ARM was an ARM, an... Read More
While most auditing of cryptographic modules are around its effectiveness against an adversary, adversaries themselves are also updating their tooling to use strong cryptography. From crypto-locking malware to advanced command-and-control... Read More
Electronics devices are always targeted with different kind of attacks due to their activities related to data processing, data storage, and data transactions. Side-channel analysis techniques for detecting and quantifying... Read More
A randomness Beacon produces timed outputs of fresh public randomness. It pulsates randomness in an expected format at expected times, making it available to the public. Beacons offer the potential... Read More
If ISO/IEC 19790 is adopted as FIPS 140-3, what will it bring to the field of physical security? What changes will be necessary for us to remain compliant to the... Read More
Panelists will discuss the role of cryptographic modules in the cloud including current use cases, mitigation of security issues and CVEs, impact of 5G and smart cities, key security, the... Read More
Can you believe FIPS 140-2 is almost 19 years old!?! FIPS 140-2 is old enough to drive … it’s old enough to vote. After some false starts its time to... Read More
An in-depth look at the real-world process of validation with input from professionals who have hands-on experience at each step. Includes a case study of an actual validated CM product.
Answers must be in the form of a question! Come watch last year’s champion versus three new experienced contestants test their FIPS knowledge in a game of trivia related to... Read More
As one of the earliest protocols in the internet, the domain name system (DNS) emerged during an era in which today’s global network was still an experiment. Security was not... Read More
NIST SP 800-90B – Recommendation for the Entropy Sources used for Random Bit Generation provides guidance for the development and validation of entropy sources. In this talk, we discuss the... Read More
Charles Brookson will provide a lively discussion on Crypto Past—and Lessons for the Future. Having been involved in security and cryptography in British Telecom since 1978, he will share many... Read More
The NIST Special Publication (SP) 800-90 series of recommendations provide guidance on the construction and validation of random bit generators in the form of deterministic random bit generators or non-deterministic... Read More
The side-channel analysis takes advantage of the key-dependent physical leakages provided by a cryptographic device, in order to recover secret information (key bytes, typically). Most of these attacks exploit the... Read More
Co-authors: Harold Booth, Luís T.A.N. Brandão, John Kelsey, René Peralta Following a 2013 prototype implementation, the NIST Beacon was upgraded in 2018 to match the new reference for Randomness beacons... Read More
A number of cryptographic key management and protection technologies are available today. Some have been in use for many years, while others are emerging in response to the transforming IT... Read More
Join atsec for a quick overview of how we made sure to be ready for the switch from FIPS 140-2 to FIPS 140-3 – and how you can benefit from... Read More
The evaluation guideline AIS 31 has been effective in the German certification scheme (Common Criteria) for almost two decades. The AIS 31, or more precisely, the corresponding mathematical-technical document defines... Read More
Galois/Counter Mode (GCM) is an approved block mode for the Advanced Encryption Standard (AES) cipher under FIPS 140-2, described in NIST Special Publication (SP) 800-38D. In that document, the security... Read More
Starting on November 7, 2020, FIPS 140-2 validations require that noise sources seeding Deterministic Random Bit Generators (DRBGs) must be compliant to NIST Special Publication (SP) 800-90B, “Recommendation for the... Read More
NIST 186-5 and other standards are slowly edging away from finite field based cryptography. The discrete logarithm problem over alternate groups have become more popular due to perceptions of improved... Read More
A new ISO standard has made in-person digital identity transactions with privacy protection a reality. Today, when we share our physical ID card, we lose control of our personal information.... Read More
Wouldn’t it be great to know with absolute certainty that an identity claim is valid? Unfortunately that’s almost never possible. At some point the question becomes: how much identity reliability... Read More
The Common Criteria has been a framework for product evaluation of security functions since its inception in the late 1990s. As DevOps became the trend for development of agile cloud... Read More
Hardware Security Modules (HSM) have been around for many years in a variety of forms but they acquired their more “modern” denomination in January 1994 with the publication FIPS 140-1.... Read More
The talk will address the challenges that we face when we need to either migrate from one cryptographic scheme to another or be able to support multiple cryptographic schemes. Even... Read More
Co-authors: Luís T.A.N. Brandão, Michael Davidson, Apostol Vassilev NIST is moving towards the standardization of threshold schemes for cryptographic primitives. The roadmap for this endeavor has two main tracks: single-device... Read More
Learning from encrypted data can address some of the primary concerns related to privacy, propriety, and legality of sharing sensitive data and potentially enable federated learning to gain insights from... Read More
With the development of IoT, millions and soon billions of autonomous devices are getting connected. One crucial step, which is necessary for the security of these devices, is to ensure... Read More
Processors used in today’s embedded systems span the spectrum of available hardware-based security features that can be enabled to secure these systems. This session will examine use cases of three... Read More
The Key Per IO (KPIO) proposal is a joint initiative between NVMe and TCG Work Groups (WGs) to define a new KPIO Security Subsystem Class (SSC) under TCG Opal SSC... Read More
Cryptography and key management are the important techniques used in PCI (Payment Card Industry) standards family including but not limited to PCI DSS (Data security standard), PIN security, P2PE (Point... Read More
Explore how system architects and implementers can quickly and effectively harness cryptographic capabilities, as encompassed in several industry standards, to provide trusted and repeatable security solutions. We’ll review Cryptsoft’s history... Read More
Cryptography plays an essential role in most PCI security standards. This session provides an update on the status of cryptography in PCI standards including existing sunrise and sunset dates for... Read More
Automotive security has received considerable interest from academic and industry communities in the past 10 years. In this talk, after providing a brief overview of attacks on automotive platforms, we... Read More
Topics to be covered: Introduction to payment acceptance on a mobile device (COTS). What about consumer experience? Payment schemes’ view. From security in a POS to security in a SoftPOS.... Read More
This presentation will report on PSA Certified, a new certification scheme for Inustrial IOT. Last year at the ICMC I spoke about PSA Certified. Since then we have fully launched... Read More
Underlying most modern security systems that protect confidentiality and integrity is the fundamental concept of cryptography; and powering every cryptographic system is the oft-overlooked presumption of a solid cryptosystem and... Read More
Today, the average time it takes for an IoT device to be attacked once connected to the internet is just five minutes. The security problem, however, is no longer limited... Read More
The design, development, and certification of cryptographic modules for protecting PCI data in a payments ecosystem is a unique challenge, especially when compared with general-purpose, embedded, or IoT environments. Compliance... Read More
This talk compares valid key management techniques using a cryptographic hardware security module (HSM) with commonly used untrustworthy software-based crypto methods that basically spoof the HSM. Two hardware-based techniques are... Read More
There is an ever-growing population of IoT devices finding their way into the Department of Homeland Security’s (DHS) designated critical infrastructure ecosystems. The rich data from these devices drive next-generation... Read More
With the imminent publication of the Dedicated Security Component (DSC) collaborative Protection Profile (cPP), cryptographic capabilities that are currently specified in other Protection Profiles (PPs) (such as NIAP’s Mobile Device... Read More
Encrypting cardholder data flowing through an entity’s network is one of the most common ways merchants try to reduce or eliminate the burden of becoming PCI compliant. Using encryption to... Read More
Cryptography plays an important role in compliance with PCI standards, such as PCI DSS, P2PE, and PCI PIN. Assessors need to look at cryptosystems for handling payment data as well... Read More
The National Institute of Standards and Technology is holding a competition-like process to standardize lightweight cryptographic algorithms. This presentation will include the submission requirements, evaluation criteria, and tentative timeline, as... Read More
The proliferation of compliance programs serving the U.S. Federal market and regulated industries has created a confusing network of overlapping product certifications. When some require validated encryption but others don’t,... Read More
OUSD(A&S) is working with DoD stakeholders, University Affiliated Research Centers (UARCs), Federally Funded Research and Development Centers (FFRDC), and industry to develop the Cybersecurity Maturity Model Certification (CMMC). The CMMC... Read More
This panel will discuss the standards process and challenges associated with creating and adopting cryptographic standards in support of information security. The focus will be on applicability to financial services... Read More
Cryptographic algorithm testing is and was always an integral part of FIPS 140-2 validations. In the past, the Cryptographic Algorithm Validation System (CAVS) was provided by NIST. Now, NIST is... Read More
The list of CVEs is always expanding, with some very familiar faces always present, and some less-familiar faces popping up occasionally. What is that telling us about different types of... Read More
FIPS 140-3 is structured very differently than the previous standard. This talk focuses on the ISO and NIST requirement documents and how they influence the CMVP program.
With the lines between enterprise key managers and hardware security modules being continually blurred or at worst, not well understood, it is easy to see two of our leading industry... Read More
This presentation walks through the standards necessary to understand how the US-Canada validation authority manages the ISO requirements and testing while meeting CMVP requirements.
With PKCS#11 V3.0 released as an OASIS standard, and v3.1 going through the final review and publication process, the OASIS PKCS#11 Co-chairs will provide an overview of what has changed... Read More
As CMVP stands up FIPS 140-3, this presentation addresses the roadmap and management of FIPS 140-2 and what this means to vendors, labs, and users. This is an overview of... Read More
Intel SGX is a trusted execution environment developed by Intel that enhances protection against disclosure or modification of data by partitioning the application into CPU-hardened enclaves and offering much higher... Read More
Whether you plan for it or not, Differential Power Analysis (DPA) is going to be a part of many security evaluations going forward, being part of requirements in FIPS 140-3.... Read More
Indirect physical attacks such as sustained power monitoring have demonstrated that it is possible for some equipment to reveal sensitive key information. This presentation will provide an overview as to... Read More
We are at the pinnacle of innovation for security. Yet, Security leaders today are stressed with too much to do, too many security tools, too much complexity, too many alerts, and... Read More
This talk walks through the standards necessary to understand how the US-Canada validation authority manages the ISO requirements and testing while meeting CMVP requirements.
There have been many exciting new developments in cryptography in recent years. Cryptographic technologies like zero knowledge proofs and homomorphic encryption enable exciting new applications. But these new cryptosystems are... Read More
PARSEC is a collaborative project led by Docker and Arm to provide a consistent interface for Edge devices access crytpographic assets stored in a wide range of endpoints. PARSEC provides... Read More
CAVP has reformulated the algorithm process over the last year. This presentation will address how the process now works, who can use the service, and how the information is used.c
On behalf of the Cryptographic Module User’s Forum (CMUF) FIPS 140-3 Transition Working Group (WG), the speaker will report the work performed by the WG to assist the Cryptographic Module... Read More
TLS is one of the widely used protocols for secure communication channels between connected devices. Security has improved for TLSv1.3 compared to previous versions of TLS. Therefore, the Network iTC... Read More
This presentation will explain the key differences between FIPS 140-2 and 140-3 requirements for the most used levels (1 and 2) of software, hardware and hybrid modules. A summary mapping... Read More
SDLC and open source cryptography in Hyperledger, defense in depth from development, testing, deployment and operation of blockchain frameworks. An open source cryptography library (Ursa) targeted to the Blockchain use... Read More
During the development cycle of Red Hat Enterprise Linux 8, the RHEL Crypto team engineers have worked on multiple fronts to both increase the amount of software we can consider... Read More
This presentation will provide the latest from the CMVP: from new and updated Implementation Guidance to lab accreditation changes, and all initiatives in between.
NCC Group Cryptography Services has completed numerous cryptography audits across a range of open-source cryptography projects over a number of years. During this talk, the speaker will focus on the... Read More
Recently Cloudflare announced a wide-scale post-quantum experiment that was conducted in cooperation with Google. We focused on using post-quantum key exchange algorithms by real clients for the TLS session establishment... Read More
The security of cryptography in practice relies not only on the resistance of the algorithms against cryptanalytical attacks, but also on the correctness of their implementations. NIST maintains the CAVP,... Read More
Co-authors: Luís T.A.N. Brandão, René Peralta, Angela Robinson Privacy-enhancing cryptography (PEC) techniques, such as zero-knowledge proofs (ZKPs) and secure multi-party computation (SMPC), enable multiple agents to interact meaningfully without revealing... Read More
Two of the most “production ready” post-quantum signature algorithms are the eXtended Merkle Signature Scheme (XMSS) and Leighton-Micali Hash-Based Signatures (LMS). Both schemes have RFCs issued for them, with other... Read More
IPA/JCMVP is the validation authority of cryptographic module validation in Japan. IPA/JCMVP has started two-year transition period of cryptographic module security requirements to ISO/IEC 19790:2012 and ISO/IEC 24759:2017, from July... Read More
This presentation provides an update on the NIST Post-Quantum Cryptography Standardization process. As we proceed to the third-round selection, this presentation shares what has been learned in evaluating the first... Read More
Over the last several years, both the CMVP and NIAP have been reducing the number of similar CPUs covered by a single CAVS test. Historically, an ARM was an ARM,... Read More
Alongside advances in quantum computing which create the need for quantum-safe cryptography, further advances in technology such as the internet of things (IoT) give rise to additional problems to be... Read More
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round. The upcoming standards are intended to replace (or supplement) current RSA... Read More
This talk will look at what is required to ensure that the connected world is secure. Specifically, it will look at the third-party certification and what we need to do... Read More
Highly regulated industries and critical infrastructure environments demand fulfillment of security requirements through rigorous and standardized approaches. In this context, the value of Common Criteria certifications is internationally recognized, but... Read More
To address the requirements of the market for IoT product evaluations, the standard SESIP (Security Evaluation Standard for IoT Platforms) was designed in and for the IoT time scales. This light-weight... Read More
There is a great need for security and assurance in the fast growing connected world. To address this need, very many dedicated security evaluation schemes are popping up, often with... Read More
Hybrid key agreement schemes combining classical and post-quantum schemes have a key benefit as the solid and well-researched security of classical schemes is combined with the quantum-safety of new schemes.... Read More
The EU has established a new Cyber Security Law. The objectives are to standardize and protect the market, eliminating the duplicate efforts and different policies among members. Although the law... Read More
Recently, FIPS 140-2 Implementation Guidance (IG) D.8 and D.1-rev3 have been updated to state the requirements for vendor affirmation to NIST Special Publication (SP) 800-56A Rev3 and the transition from... Read More
Evolutions on quantum computing make us worry about its impact on actual technologies. In such a context, in this talk we are interested in the impacts of the post-quantum cryptography... Read More
Several NIST key establishment standards have been recently updated: SP 800-56A, 56B and 56C. As these standards represent a significant shift in the key agreement and key transport paradigms, it... Read More
The cryptographic landscape is evolving as quantum computing emerges. New quantum-safe standards will be published in the next few years. These changing global standards will pose many challenges for organizations.... Read More
Cloud has become an inevitable infrastructure for government agencies world wide. So, securing workloads in the cloud has become a high priority task. FedRAMP is an established US government Risk... Read More
In this talk, we will analyze in depth the need for harmonization between NIAP and CAVP (FIPS) requirements. We will review changes to the recent NIAP Policy 5 Guidance update... Read More
Details of the presentation will be announced, based on pending events and positions. This presentation will address and explain the NSA positions on cryptographic choices today that best position organizations... Read More
If you read the news these days relating to cyber security, it is virtually impossible to miss the large number of articles which focus on the ever-increasing labor shortage in... Read More
Supersingular Isogeny Key Encapsulation (SIKE) is the only key exchange mechanism based on elliptic curves submitted to NIST for standardization. Although SIKE is a younger candidate in comparison to the... Read More
ACVP is becoming the only accepted method by which cryptographic algorithms are validated and certified with NIST. As the CAVS tool’s time comes to an end, so to do some... Read More
After giving an overview of the Open Quantum Safe (OQS) project, the presenter will describe recent post-quantum cryptography experiments in TLS/SSH using OQS, including: 1) benchmarks on the impact of... Read More
The much-awaited FIPS 140-3 is here but the elephant in the room is “what happens to all the 140-2 module and algorithm certificates?” This presentation will look at the various... Read More
This talk will discuss the challenges and opportunities faced by the move to cloud based HSMs. The current standardization landscape will be discussed, including a dive into the new PCI... Read More
ISO standardization has made in-person digital identity transactions with privacy protection a reality. Today, when we share our physical ID card, we lose control of our personal information. Once handed... Read More
The Department of Defense (DoD) has always considered cryptographic security a top priority for products listed on the Department of Defense Information Network Approved Products List (DoDIN APL). From its... Read More
The state of the art in privacy-enhancing cryptography (PEC) includes various tools that fall outside traditional standardization activities. Yet, as technology advances, some of these PEC tools (ZKP, SMPC, PSI,... Read More
Online Certificate Status Protocol (OCSP) gives users of a PKI a means of knowing whether an x.509 certificate is valid in real time. The protocol is intended to replace the... Read More
This is an introduction to the PCI Security Track. Troy Leach will provide an overview of PCI Standards and industry direction with an emphasis on the role that cryptography plays... Read More
As was discussed in CMUF training sessions in summer 2019, actual requirements for Non-Invasive Attacks are expected to be announced by CMVP by the end of 2021. This presentation will... Read More
Side-channels are non-intentional physical emanations which might leak sensitive information out of the boundary of chip. The threat is well-known: even if cryptographic keys are kept safe while at rest,... Read More
This is a reprise of last years highly successful panel discussion. The status of ANSI/X9,ISO, NIST and PCI standards in the crypto space forms the basis of this discussion.
MACsec, also known as IEEE 802.1AE, is a network security standard that adds confidentiality and integrity to layer 2 traffic. The standard was initially published in 2006 as an extension... Read More
Since the end of the 90s, side-channel attacks have gotten more public attention starting with simple and differential power analysis going towards profiled attacks and machine learning in the recent... Read More
Certification evaluation process can be challenging for all parties involved. Vendors want their products to market and evaluation labs evaluate against various standards such as FIPS 140-2/140-3 and PCI to... Read More
As outlined in NISTIR 7977, NIST commits itself to the periodic review and maintenance of its cryptographic standards and guidelines. In this context, NIST has established the Crypto Publication Review... Read More
Within the past year, ACVT has been going on at full speed between NIST, the vendors, and the labs. atsec has been a pioneer in this work in collaboration with... Read More
IBM first achieved PCI HSM for the Crypto Express 6S (CEX6S) with Common Cryptographic Architecture (CCA) firmware for IBM Z in 2018. IBM achieved an update certification in 2019 and... Read More
Two separate working group updates will be provided. 1. Single Chip Working Group – Details about the group itself (when it was formed, # of members, etc.) – Group objectives... Read More
Implementing P2PE can be difficult for any organization, but bringing together disparate legacy processes and key management systems into a unified product strategy that is both efficient and P2PE-compliant can... Read More
A secure implementation of a randomness beacon, such as specified by NISTIR 8213, poses a number of challenges related to the composition of various components and functions. For example, it... Read More
AWS is working with NIST, IETF and ETSI to ensure that post-quantum standards are ready. We are gaining experience in deployment on a large scale by enabling PQ TLS in... Read More
Most of the 100+ products we certify a year are “platforms” that need to be composed with software towards a complete end-product. It is those end-products that actually have the... Read More
Organizations within the Federal Government will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and integration... Read More
This is a placeholder, pending approval of final content. The general intent is to give an update on the NSA position regarding the use of post-quantum cryptography, plans for the... Read More
Hardware security modules have long represented the industry standard way of protecting private and secret keys for information security infrastructures. As information processing moves to the cloud this panel discusses... Read More
The transition to post-quantum cryptography (PQC) is underway and in just a few months NIST will announce their Round 3 selections, naming the first set of PQC algorithms to be... Read More
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT devices that do not meet specified security protocols. According... Read More
NIST post quantum cryptography (PQC) candidates will soon undergo a third round of vetting and standards are likely to be published in draft form by 2022. But the real work... Read More
Public-key cryptography at the heart of all protocols will need to be replaced or supplemented with post-quantum components to achieve long-term security. This talk describes avenues and problems in transitioning... Read More
Device Identifier Composition Engine (DICE) is an emerging industry standard published by the Trusted Computing Group (TCG). DICE is intended to be a more lightweight alternative to the TCG’s well-known... Read More
The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to solve (elliptic curve) discrete logarithm and integer factorization problems... Read More
This presentation is a joined case study between Bundesdruckerei & Deutsche Fiskal and PrimeKey. It will show how to design and implement a Common Criteria Certified Cloud Service for fiscalization.... Read More
In 2016, NIST announced a worldwide call for submissions to replace the public-key cryptographic algorithms which would be threatened by attacks from a large-scale quantum computer. In response, NIST received... Read More
The multi-factor authentication (MFA) requirement for operator authentication is introduced at FIPS 140-3 Level 4. This presentation is intended to show that the restrictive specification of this Level 4 MFA... Read More
How do I write a requirement specification for a Post-Quantum Cryptography (PQC) module or its system integration? The new NIST PQC and Hash-Based Signature (HBS) algorithms are not entirely drop-in... Read More
The multi-party track of the threshold cryptography project at NIST is developing criteria for future proposals of threshold schemes. These schemes will specify distributed operations for generating cryptographic keys and... Read More
The key establishment schemes defined by SP 800-56A form an integral part of the modules which are used in protocol-based implementations. Recently, the CMVP announced the decision to delay the... Read More
Moving to the cloud is easy, but securely managing cryptographic keys in the cloud is not so simple, and often complicated. There are many software solutions, some hardware security module... Read More
In addition to concentrating on standardization of raw primitives, a related, parallel effort should investigate interoperability standards, such as key serialization and signature/key-exchange format support. A combination of these activities,... Read More
The talk will provide an update on the third part of NIST SP 800-90 series, specifically explaining the RBG constructions and their security guarantees and requirements.
Open Source today dominates the software landscape. This presentation will explore the challenges of handling fast paced development and frequent release cycles of upstream Open Source projects with the complexity... Read More
FIPS-140-3 create new requirements beyond FIPS-140-2. A number of cryptographic modules use the PKCS #11 layer as their cryptographic boundary, so sometimes those requirements need to be reflected in the... Read More
The progress in quantum computing poses a threat to today’s cryptography. One proposed solution is Quantum Key Distribution (QKD). QKD promises security based on the principles of quantum mechanics. But... Read More
This panel will discuss the new rules and requirements for Random Number Generators/Entropy Sources based on the SP 800-90 requirements with a focus on the technical aspects of producing a... Read More
With the lines between enterprise key managers and hardware security modules being continually blurred or at worst, not well understood, it is easy to see two of our leading industry... Read More
This talk will be about integration of quantum-safe cryptographic algorithms into hyper-scale hyper-connected IoT devices that are size, weight, and power (SWaP) constrained. Quantum-safe cryptography is an uncharted territory as... Read More
The BSI evaluation guidelines for random number generators, AIS 20 and AIS 31, have been effective in the German certification scheme (Common Criteria) since 1999 and 2001, respectively, and were... Read More
This talk will review the foundations of cryptographic vulnerabilities as applicable to open-source software from a penetration tester’s perspective over multiple public cryptography audit reports. It will discuss what attacks... Read More
Cryptographic performance pressure produces many different cryptographic specifications, and a much larger number of pieces of software trying to make those cryptographic functions run quickly in various environments. The pre-quantum... Read More
Traditionally, the most data-heavy part of a TLS handshake has been authentication which includes a handshake signature and certificates with public keys and signatures. Although most common TLS usecases are... Read More
Over the few last years, the focus for entropy discussions was the entropy source to demonstrate that sufficient entropy is provided and it is compliant to SP 800-90B. As this... Read More
Direct wireless communication between vehicles could prevent up to 600,000 non-alcohol-related vehicle crashes in the U.S. every year [3]. The core of the two main vehicle communication protocols, namely Dedicated... Read More
The Open Quantum Safe (OQS) open-source project supports the development and prototyping of quantum-safe, or post-quantum cryptography. In this talk, I’ll give an overview of the various OQS projects (including... Read More
The RISC-V Instruction Set Architecture (ISA) has emerged as a free and open challenger to proprietary ISAs in the semiconductor industry. An on-chip Entropy Source interface (for RBGs) is a... Read More
The RISC-V Instruction Set is a popular free and open alternative to historically closed CPU Instruction Set Architectures (ISAs) like ARM and x86. RISC-V’s collaborative ecosystem, and lack barriers to... Read More
This 30 minute presentation will introduce the audience to the on-going work of the European Telecommunication Standards Institute’s Quantum-safe Cryptography Technical Committee. We will outline the published recommendations and standards,... Read More
There are several important steps in developing a H_submitter estimate for noise sources based on periodically sampled ring oscillators. In this talk, I will identify several of the common stochastic... Read More
Performance of software implementations on today’s available hardware architectures plays a crucial role in the adoption of quantum-safe cryptography. An important target for quantum-safety are IBM Z(R) systems, which run... Read More
Quantum computing will introduce a new threat to National Security Systems, critical infrastructure, and potentially all of us. It is important to plan to protect against this threat before the... Read More
With more than two decades of experience in the information security industry, Charles leads a global team of hackers, researchers, investigators and incident responders. The team provides clients – from... Read More
AWS-LC is a general-purpose cryptographic library maintained by the AWS Cryptography team for AWS and their customers. The speaker has recently submitted AWS-LC for validation under FIPS 140-3. This talk... Read More
The NIST Cryptographic Technology Group (CTG) is responsible for 40+ cryptography standards, guidelines, and recommendations. In January 2021, the CTG established the Crypto Publications Review Board. The Board coordinates internal... Read More
At the start of 2022, the Legion of the Bouncy Castle Inc. was provided with funding to add all the Post Quantum finalists and alternate candidates to the Bouncy Castle... Read More
The Crypto Publication Review Board was established by NIST to identify cryptography standards and other publications to be reviewed. Currently, the NIST-recommended modes of operation (NIST SP 800-38 Series) are... Read More
FIPS-140-3 imposes interesting new requirements and challenges for the certification of open source modules. In this talk the speaker will go over the approaches taken at Red Hat to address... Read More
Presenting personal information in the form of a QR code has become a daily reality for many during the Covid pandemic. In many jurisdictions across the globe, people showed their... Read More
Rust is a systems programming language primarily focused on performance, memory safety, and safe concurrency, enforced by the infamous Borrow Checker. Because of these guarantees, Rust is increasingly used to... Read More
In an ideal world, products which are slated to be subjected to formal security certification processes (e.g., FIPS 140, CC, etc.) would be architected, designed, built, tested, QA’d and delivered... Read More
The interfaces exposed by popular cryptographic libraries, like OpenSSL or BouncyCastle, are designed for general-purpose computers and not always suitable for small IoT devices. In those devices, the secret keys... Read More
Token-based authentication is widely used for web, cloud, and single-sign-on applications. A cryptographic module providing stateless connections often relies on token-based authentication to avoid the burden of traditional PIN management.... Read More
In many security domains, multiple operations and security items are considered sensitive enough that performing or using them requires a quorate or at least an elevated authentication. Whether this is... Read More
This expert panel will discuss issues around re-test requirements for module updates, including: Updates for discovered module vulnerability; Handling non-module updates in FIPS; Vendors labs NIST, how are we going... Read More
Labs often encounter questions from Vendors dealing with defining a prospective module’s cryptographic boundary properly. In the past, simply defining a firmware module as software that is contained within a... Read More
This talk will provide updates on the ongoing development of the SP 800-90 series. At the time of ICMC 2022, a draft of SP 800-90C, Recommendation for Random Bit Generator... Read More
Virtualization and multitenancy are a common technologies that have been used across IT ecosystems for decades, but can those same principles be applied to hardware security modules (HSM)? This has... Read More
Since accepting FIPS 140-3 reports on 22 September 2020, the atsec CST lab has submitted almost a dozen reports to the CMVP. Some of them are currently in the coordination... Read More
The BSI evaluation guidelines for random number generators, AIS 20 and AIS 31, have been effective in the German Common Criteria certification scheme for over 20 years, and were last... Read More
This talk is primarily for vendors with existing FIPS 140-2 modules highlighting some of the subtler changes between the standards that could still force a change in module design before... Read More
This talk provides a comparison of functionality classes of BSI’s AIS 20/31, DRG.2, DRG.3, DRG.4, PTG.2, PTG.3, NTG.1 with the random number generator constructions and entropy sources of NIST’s SP... Read More
Both the Single-Chip and Bound/Embedded Working Groups within the CMUF are on their second year of existence. This talk will focus on what each group has accomplished in the last... Read More
NextG network systems (5/6G cellular, Next Wi-Fi, satellite networks) are expected to connect billions of hyperscale heterogenous Internet of Things (IoT). NextG networks are supposed to offer resistant against quantum... Read More
As the ongoing update of ISO/IEC 19790 moves to the committee draft stage, this talk will look to review trends for cryptographic modules and review what opportunities exist to evolve... Read More
Institutions like ANSSI and BSI recommend hybrid or multi-key mechanisms for the migration and transition to quantum-safe cryptography. Multi-key mechanisms combine the computation classical cryptographic schemes with quantum-safe schemes to... Read More
Recently NIST started to enforce that auxiliary requirements of various algorithm specifications must be present and enforced by a FIPS module. Such requirements cover aspects such as how keys used... Read More
NIST has introduced a new method of submitting entropy sources for validation. NIST offers two ways of submitting the information which will be presented. An open-source Python client offers a... Read More
The new Post-Quantum Cryptography (PQC) algorithms and ISO 17825:202x (non-invasive) side-channel attack mitigation testing are two of the biggest upcoming requirement changes to cryptographic modules. High-assurance hardware crypto modules will... Read More
The Security Protocol and Data Model (SPDM) is a protocol published by Distributed Management Task Force (DMTF). Since its debut in 2019, SPDM has been employed by several standard bodies,... Read More
The NIST and CCCS Entropy Analysis Report reviewers will discuss the quality of entropy reports submitted to the CMVP along with common pitfalls and how to fix them. The panel... Read More
Vendors who design a cryptographic module know that all its FIPS-approved cryptographic algorithms must be CAVP certified. Normally, this certification process requires the use of an external 3rd Party CST... Read More
Cryptographic Module vendors operate in a vast and varied international marketspace. ICMC is International in name, in attendance, and in its reach of audiences. However, the FIPS 140 standard, which... Read More
Evaluation of the amount of entropy provided by a random bit generator (RBG) is an area which NIST has standardised in SP 800-90B, and which is now mandatory as part... Read More
It’s been six years since NIST began its PQC standardization process. After sixty nine initial candidates and three rounds of evaluation, NIST recently announced the first PQC algorithms that it... Read More
US and Europe are defining independent cryptography standards and evaluation methodologies, which could result in misalignment with regional certification schemes. This talk will explain: • Cybersecurity challenges of misalignment between... Read More
The assessment and testing of an entropy source is one of the most complex and most fascinating processes in a FIPS 140-3 validation. This year, we saw the Entropy Source... Read More
NIST is expected to announce the results of a search for quantum-resistant public-key cryptographic algorithms. This panel will discuss changes in the cryptographic ecosystem that may follow.
PSA Certified is three years old and now has over 100 certified products. It has grown from four to six test labs and forged alliances with other organizations such as... Read More
Traditional hardware for random bit generation is notoriously hard to characterise and, as a consequence, bounds on the generated entropy are hard to trust. As opposed to algorithms for cryptography,... Read More
Data transfer and communication across long distances is one of the many applications subject to the quantum threat. The highly collaborative BaSQuaNa project works to leverage diverse technologies with their... Read More
It would take hours to get into the weeds on the various non-invasive attack approaches that CMVP will eventually have labs execute on a module or its host platform. The... Read More
Very few vendors implement cryptography. At the heart of most certified modules is third party and open source cryptography. CMVP already allows vendors to use the “FIPS logo” if they... Read More
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt data between communicating parties at a relatively high performance cost. To reduce computational overhead, modern network protocols combine... Read More
Transitioning open source cryptographic modules to FIPS 140-3 is very challenging. Vendors looking to leverage open source FIPS modules need to take several factors into consideration including: timing of updates... Read More
Based on experience working for a NIST CST laboratory preceded by working for a major vendor of FIPS 140-2 cryptographic modules, there are lessons learned from both perspectives. This introductory... Read More
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT devices that do not meet specified security protocols. According... Read More
The National Institute of Standardization and Technology (NIST) is running a standardization program for post-quantum cryptography to address the threat arising from future developed quantum computers capable of breaking our... Read More
This is a PCI Track reprise of this panel which includes representatives from NIST, ANSI/X9, ISO/TC62, and PCI SSC. A moderated discussion of cryptographic standards activities in each of these... Read More
This talk will provide an update on the PCI SSC standards and activities with respect to cryptography, key management, and device security. PCI SSC have 14 standards and many more... Read More
As a maturing standard, PCI-HSM 4.0 recently turned its attention to ‘payments HSM in the cloud’. Following multiple consultations with industry through PCI’s Request For Comments (RFC) process, this lead... Read More
This talk will present a number of selected cryptography vulnerabilities frequently encountered during security reviews and penetration tests of IoT solutions.
Hardware Security Modules use keys to process payment transactions–which are protected in Key Blocks when outside the HSM. Key Blocks have received a lot of attention in the last few... Read More
Deep packet inspection (DPI) of network traffic can prevent cyberattacks if threat data is shared rapidly, however, reluctance to share sensitive information has limited its use. Confidential DPI can run... Read More
This talk will demonstrate an elaboration on PIN block and the importance of PIN Block translations in the financial industry, followed by a walk-through of encipherment and decipherment of various ISO... Read More
On the 10th anniversary of ICMC, panelists will discuss the outlook for the next decade. Will we be protected by privacy-enhancing technologies and universal frameworks for cybersecurity? Or will we... Read More
Cryptographic modules and techniques will have to adapt to a Post Quantum world. Many of the algorithms and structures we take for granted will no longer be secure. In this... Read More
Correct and secure implementation of crypto modules is crucial for the overall system security which is, however, an error-prone and non-trivial task. A reliable and practical solution is to design... Read More
To minimize the risk that a future Cryptographically Relevant Quantum Computers (CRQC) poses to current and soon-to-be-deployed operational systems, we need to find ways to accelerate the adoption of the... Read More
Numerous tests, including NIST STS and DIEHARDER test suites, have been formulated to assess RBG quality. However, these and others examine only the correlative properties present in a RBG stream.... Read More
As of March 2023, MITRE is standing up a PQC Coalition of industry, government, and academia to address long-term cybersecurity issues in the real-world migration to quantum-resistant systems. Topics of... Read More
Virtualized environments rely on high-quality entropy for generating cryptographic keys and securing sensitive data. In many cases, the entropy sources within the VM or sourced from hypervisor may be of... Read More
In July 2022, NIST announced the first four algorithms that it would be standardizing as part of its post-quantum cryptography standardization project. This included algorithms for both key-establishment as well... Read More
With the publication of FIPS 140-3, EFP/EFT testing was added as a FIPS 140-3 requirement at security level 3 security level. FIPS 140-2 was required at security level 4 but... Read More
The BSI evaluation guidelines for random number generators, AIS 20 and AIS 31, have been effective in the German Common Criteria certification scheme for over 20 years, last updated in... Read More
This presentation will be delivered by a member of the ISO editing team for both ISO/IEC 19790 and ISO/IEC 24759 will provide a status update on the ongoing updates to... Read More
Abstract: This presentation will provide updates on the ongoing development of the SP 800-90 series. In 2022, NIST published a draft of SP 800-90C, Recommendation for Random Bit Generator (RBG)... Read More
Advances in quantum computing could compromise many of the current cryptographic algorithms being widely used to protect digital information, necessitating replacement of existing algorithms with quantum-resistant ones. Previous initiatives to... Read More
This talk will discuss the expected transition from 19790:2012 to 19790:202x. It will present the major anticipated work items, a possible transition timeline, as well as any foreseen challenges. As... Read More
NIST and BSI have been in an ongoing process of harmonizing the SP 800-90 Series with AIS 20/31. Although the requirements are not identical, there are several pairs of random... Read More
Health tests are an integral part of entropy sources. These tests are critical for ensuring security, because noise sources can be sensitive to process variation in manufacturing, component aging or... Read More
The version of ISO/IEC 19790 (hereafter 19790) adopted as FIPS 140-3 was published in 2012. Since its publication, it has gone through four working drafts (WDs) and one committee draft... Read More
As technology advances and the reality of quantum computing becomes more real, the world must prepare for a scenario where most of our classical algorithms are vulnerable to being broken.... Read More
As estimates for the migration time to post-quantum cryptography grow and milestones in quantum computing technology accelerate, it is worth noting that many cryptographic systems are not quantum vulnerable, and... Read More
The focus of the talk will be to discuss the “hybrid” classic and quantum/post-quantum approach, where non-approved quantum or post-quantum cryptography is mixed with approved cryptography for encryption, signature, key... Read More
Triple-DES, Non SP 800-56B Rev. 2 RSA key establishment, RSA with PKCS v1.5 padding, FIPS 186-5 (X9.31) are among algorithms transitioning to Historical by the end of year or early... Read More
This talk describes a buffer overflow vulnerability in the SHA-3 implementation submitted to NIST, which remained undetected for well over a decade. The vulnerability affects several widely-used software projects that... Read More
NIST issued in January of 2023 the initial public draft of a Call for Multi-Party Threshold Schemes (NISTIR 8214C ipd). This is a process toward collection of reference material on... Read More
FIPS 140-3 has seen improvements in a few areas. Two of these deal with the management of self-tests and hybrid modules, or modules that can selectively use hardware assistance where... Read More
PQC has been around for a while. But, for the longest time companies focused only on proof of concepts, given the lack of standardization and Quantum Computers – with sufficient... Read More
Today‚ Äôs end-to-end encrypted messaging services rely heavily on quantum-vulnerable algorithms like Elliptic-Curve Diffie-Hellman. This talk will present a prototype of a post-quantum end-to-end encrypted messaging solution, which adapts the... Read More
PKCS #11 3.1 is in Committee Draft form and should be final by the time of ICMC. Its text has been stable for about a year now. I’ll quickly review... Read More
This talk will focus on the challenges on product development based on post-quantum cryptographic hardware. The speaker will discuss performance metrics, physical security requirements, agility, as well as deployment challenges... Read More
This talk will be a practical exploration of how capabilities available in OASIS KMIP for cataloguing and managing cryptographic keys and other security objects can be effectively used as part... Read More
Lattices pose arguably the most important problems underlying PQC. These problems are believed to be hard or computationally infeasible, even for quantum computers. Yet it is often unclear what motivates... Read More
The quantum era is driving new cryptographic primitives, algorithms, protocols, applications, and systems. These advances can spur secure innovation for new and improved technologies. However, cryptography must be trusted in... Read More
Joining the OpenSSL team in February 2023, I brought along experience from previous roles in Red Hat and Mavenir. At Red Hat, I had the opportunity to grow from an... Read More
The cryptographic algorithms of CRYSTALS Kyber and Dilithium gained more reception recently by being selected as algorithm of choice by the CNSA 2.0 specification. The mentioned algorithms are new without... Read More
During the 1990’s the introduction of the internet, web browser, email and resulting electronic services led to an initial commercialization wave of crypto and security technologies. During this time security... Read More
This panel will continue the discussion from last year’s panel on the same topic, security vs compliance–is it possible to achieve both? What should our goals be? How can we... Read More
This talk will reveal original research concerning the examination of the AES cryptographic algorithm which provides a new method of cryptanalysis of AES. This talk will: a) Define the concept... Read More
The recent release of CNSA 2.0, and its encouragement for vendors to begin adopting stateful hash-based signatures (HBS) immediately for FW/SW signing applications has renewed interest in a technology that... Read More
State management has generally raised both operational and security concerns for cryptographic module implementations of hash-based signature schemes. The speaker will review the concerns and propose a counterexample: the combination... Read More
With the publication of FIPS 186-5, NIST has taken an important step to further align the algorithms available in FIPS 140-3 with real-world adoption. Still, there are some areas where... Read More
The number of Common Vulnerability and Exposures (CVEs) continues to grow each year. The FIPS 140-3 standard introduced more defined CVE management requirements for cryptographic modules. Managing CVEs are critical... Read More
Korea has introduced new certification program for Quantum Key Distribution System in November of the last year and started the official process in April. As an organization applying for the... Read More
Advancements in Non-invasive attacks are an increasingly worrisome topic for IT security professionals and product vendors. This talk is about practical approaches to mitigate these side-channel attacks. There is no... Read More
A hot topic in the community is the importance of crypto-agility, and how diversifying one’s security base can strengthen resilience. Whilst validation programmes like CMVP are considering PQC, movement towards... Read More
In recent years, Digital Identity has became a raising topic for governments, enabled by significant development in Smartphone and Connectivity. In this presentation we will review the key challenges for... Read More
The architecture and infrastructure that underpins our digital economy has evolved significantly in the last 20 years. However the form factors of hardware security modules have not kept pace with... Read More
Learn about the activity within the PCI Security Standards Council. Get an update of current standards. Be informed about upcoming activity within the council and see how these activities are... Read More
In the alphabet soup that is the landscape of product security certifications today, it is well understood that FIPS is the foundational certificate. Often that means that it gets the... Read More
The Cryptographic Module Validation Program (CMVP) was established on July 17, 1995, by the National Institute of Standards and Technology (NIST) to validate cryptographic modules conforming to the Federal Information... Read More
Has the industry reached “peak deployment” for on-premises payment HSMs? How can cryptographic module developers design next-generation hardware for an increasingly cloud-centric end user? How has the PCI Security Standards... Read More
With the rising number of resource-constrained devices, the demand of verifying the trustworthiness of a remote platform that a device connects to is getting stronger every day. The worry of... Read More
Payments cryptography appears arcane compared to general purpose cryptography. Admittedly, artifacts like the continued use of triple DES and printed key components for key exchange are certainly arcane. This talk... Read More
New CA/Browser Forum Baseline Requirements (effective June 1, 2023) require CAs to verify key residency in a FIPS 140-2 level 2 or Common Criteria EAL 4+ module prior to issuing... Read More
Physically Unclonable Functions (known as PUFs) are devices that can be integrated in hardware chips. They allow to rebuild a private/secret key or a public identifier, which is termed immutable.... Read More
The payment networks we use every day rely on cryptography based protocols and secure devices governed by national and international standards, enforced by local and global audit regimes. Security standards... Read More
Come join Seamus, Brent, and a pair of disembodied hands for this informative and entertaining video presentation (with a live component) to learn the physical security requirements in FIPS 140-3... Read More
This panel will discuss the status, coordination, and plans for cryptographic security standards including NIST, PCI, ISO TC68, and ASC X9, with panelists from each of these bodies. While each... Read More
Companies with large portfolio of products like VMware benefit enormously from the rebranding and 1SUB processes allowed by NIST for OSS cryptographic libraries. However, as businesses move increasingly towards the... Read More
Recently, there has been a renewed interest in key attestation with the requirements from the Certificate Authority/Browser (CA/B) Forum to have code signing keys stored in hardware security modules (HSMs).... Read More
This talk will address the challenges of automating the application of formal methods in the validation of cryptographic algorithms and verification of cryptographic protocols using experimental validation platform. Using equivalent... Read More
This talk will present cryptographically significant effects stemming from compiler version differences in software module(s) since mid-2022. The speaker will present this research to the ICMC community along with a... Read More
This talk will present OpenFHE, a widely used open-source Fully Homomorphic Encryption software library. OpenFHE is an open-source project that provides efficient extensible implementations of the leading post-quantum Fully Homomorphic... Read More
Driven by the demand for cryptographic protection in resource-constrained devices, NIST has initiated a lightweight cryptography competition between 2019 and 2023. Among 57 submissions, Ascon has been selected as the... Read More
Initial presentations on ideas for speeding up the CMVP queue and processing times followed by an open floor brain storming session to bring in thoughts and ideas from the audience... Read More
Fully homomorphic encryption (FHE) can be used to secure a variety of ML models. The speaker will show that FHE can be applied to large-scale recurrent neural networks (RNNs) and... Read More
The remarkable advancements in generative AI technologies have raised significant challenges, particularly in countering the malicious use of AI by threat actors. As these technologies become more sophisticated and accessible,... Read More
With the increase of constant threats and risks, now’s the time to get your house in order for Post-Quantum Cryptography. This session will highlight these increased risks and outline how... Read More
Several PQC key-exchange and signature algorithms are undergoing standardization by agencies such as NIST and IETF, with others in draft or evaluation phases. International standards bodies like ENSIA and CACR... Read More
As the NIST Post-Quantum-Cryptography (PQC) competition progresses, industry groups and standards bodies are exploring mechanisms for managing and easing the upgrading of public key infrastructure. This session will examine proposals... Read More
SafeLogic, serving as a workstream lead for organizations collaborating with NIST NCCOE on Post Quantum Cryptography (PQC) Vulnerable Cryptography Discovery Workstream: Risk Management and Prioritization, will share key lessons learned.... Read More
This talk will cover strategies that organizations can deploy today to prepare for challenges of the near future, using encryption strategies based on NIST-approved quantum-safe algorithms running on FIPS-rated Hardware... Read More
In this talk, GlobalPlatform will provide guidance on ensuring high levels of security as cryptography trends and technologies evolve, and how to address challenges in deploying Post Quantum Cryptography. Attendees... Read More
The threat of a Cryptographically Relevant Quantum Computer (CRQC) has driven the industry to replace classical public key algorithms with Shor-resistant algorithms. However, these algorithms come with their own set... Read More
Data, compute cycles, and even decision making has been revolutionized with the advent of the ‘cloud’. In this definition, cloud computing or networking occurs when two or more non-collocated nodes... Read More
Random number generators (RNGs) play a vital role in cryptography, facilitating key generation, digital signatures, and secure communications. The Hash Deterministic Random Bit Generator (Hash DRBG) stands out for its... Read More
This talk will explore methodologies for evaluating open-source cryptography libraries and applications based on years of cryptography audit experiences. Open-source cryptography finds widespread use across various industries, yet users often... Read More
The CMVP Program Managers (NIST and CCCS) will present the future roadmap of CMVP initiatives, addressing upcoming issues and challenges in the program. This includes automation projects.
If successful, the recent xz Utils backdoor to SSH could have overshadowed the impact of the SolarWinds event in 2020. Unlike the SolarWinds event, this vulnerability had the potential to... Read More
PKCS #11 3.2 is currently under development, with a focus on FIPS 140-3 features and post-quantum computing. Substantial progress has been made, and the talk will review some of the... Read More
This talk will explain how the entire IoT device ecosystem, including laboratories and certification bodies, can streamline security evaluation and certification efforts. GlobalPlatform will introduce the Security Evaluation Standard for... Read More
This talk will cover OpenSSL’s release and feature roadmap for the coming year, the new release schedule following the adoption of time-based releases, the current status of Post-Quantum Cryptography in... Read More
This talk will provide insights into the evaluation process of FIPS 140-3, from initial engagement to successful submission of the certificate. It will cover aspects such as performing gap analysis... Read More
Security certification frameworks like FIPS 140-2/3 or Common Criteria subject certified products to extensive scrutiny. This talk will discuss insights gleaned from the ecosystem of certified devices through extensive analysis... Read More
This presentation looks at the recent governance changes in OpenSSL. We will cover the challenges faced, the solutions implemented, and how these changes aim to improve decision-making and community involvement.... Read More
This talk will feature a panel discussion with entropy reviewers to reflect on observations from entropy reports over the past year, changes in guidance, and address audience questions.
NIST is currently exploring ways to address limitations in approved block cipher modes of operation outlined in the NIST Special Publication 800-38 series. This talk will provide an overview of... Read More
In this talk, the focus will be on the underlying cryptographic management systems to ensure secure storage and availability of cryptographic objects in heterogeneous vendor environments. The OASIS Key Management... Read More
This presentation explores the intricacies of conducting FIPS 140-3 validation for cryptographic modules deployed within public cloud infrastructure. Leveraging the company’s experience navigating current requirements for cloud-based cryptographic modules, the... Read More
This talk explores the challenges and choices made in building a new Open Source FIPS-ready software token primarily in Rust, a well-known memory-safe language. Language safety and memory safety considerations... Read More
In recent years, Europe has made significant strides in the cryptographic field, emerging as a global powerhouse. The widespread adoption of cryptographic primitives to safeguard sensitive information across hardware, software,... Read More
In FIPS 140-3, Level 4 operator authentication requires the implementation of identity-based multifactor authentication. This talk will explore the classic interpretation of authentication factors and consider its application to machines... Read More
The two major public forks of OpenSSL, BoringSSL from Google and LibreSSL from OpenBSD, do not support the OpenSSL 3.0 “cryptographic provider” API. Many disagree with this approach, advocating for... Read More
The version of ISO/IEC 19790 adopted as FIPS 140-3 was published in 2012. Since then, it has undergone several revisions. The panel, consisting of experts, will discuss major updates to... Read More
Today’s industrial processor and system design involves various metrics, but security-related metrics are often considered post-silicon. This presentation describes a vision where security-related metrics are integral to pre-silicon modeling and... Read More
The initial release of OpenSSL 3.0 provided a FIPS module supporting the retiring (now-retired) 140-2 standard. This talk will discuss areas that must be addressed to uplift OSSL3 to the... Read More
Achieving FIPS 140-3 validation for a cryptographic module is complex, especially when transitioning from the previous FIPS 140-2 standard. This talk explores the gap analysis phase as a crucial step... Read More
This talk provides updates associated with FIPS 140-2/3 validations of the OpenSSL FIPS Provider module, validated versions, and differences between them. Attendees will be equipped to determine the version of... Read More
This talk will explore how to use tools around memory protection, integrity checks on pre- and post-update values, and boundary definitions to allow updates to occur on a validated system... Read More
The transition to quantum-safe cryptography presents an opportunity to establish a more robust and resilient infrastructure, rather than merely treating post-quantum cryptography (PQC) as a direct replacement for existing methods.... Read More
Entropy plays a crucial role in FIPS validation, yet remains poorly understood. As the founder and leader of the CMUF Entropy Working Group since 2018, the speaker possesses valuable insights... Read More
This talk covers both physical and non-physical noise sources utilized for entropy generation. It provides examples of various noise sources, including those based on ring oscillators, metastable latches, CPU jitter,... Read More
Post-processing algorithms and conditioning functions are integral components of entropy sources and random number generators. They are applied to the raw output of the noise source to enhance the entropy... Read More
The well-established DRBGs specified by SP800-90A are prevalent, primarily due to their compliance with FIPS 140-3 requirements and reliance on long-standing cryptographic primitives. However, recent years have seen the emergence... Read More
BSI and NIST have jointly developed standards and guidelines for generating random numbers suitable for cryptographic applications. The BSI evaluation guidelines AIS 20 and AIS 31, along with NIST’s Special... Read More
In this talk, Paul will explore common vulnerabilities encountered in modern programming languages when implementing cryptographic systems. He will discuss prevalent security risks across languages like Rust, and how even... Read More
Due to its widespread usage, the FIDO2 protocol urgently needs to be migrated to be post-quantum secure. This presentation will explain the steps taken over the last two years towards... Read More
Now that we have standardized algorithms, we have the tools to avoid the Quantum Computing Cryptopocalypse. But these are tools we are only just beginning to learn how to use... Read More
In a world where FIPS has been viewed as a drain on cryptographic performance and quality, what will it take to make FIPS something that can be used everywhere? This... Read More
The NIST National Cybersecurity Center of Excellence (NCCoE) Post Quantum Cryptography (PQC) Migration Effort is an ambitious endeavor aiming to bring together industrial collaborators worldwide to address various issues related... Read More
Software implementations of random number generators (RNGs) may lack direct access to an entropy source and rely on other software or system components to seed and reseed their deterministic random... Read More
The CMVP will host a discussion on important topics within the CMVP community. Following a brief presentation from the CMVP’s perspective, panelists will share their insights on trust in labs... Read More
This talk will cover the development of a stochastic model tailored for estimating min-entropy in ring oscillators, essential components in designing secure cryptographic systems. The aim is to bridge the... Read More
Cryptography underpinning data confidentiality and integrity is evident not only in the high demand for cryptographic module validation but also in the Dedicated Security Component collaborative Protection Profile (DSC cPP).... Read More
The Post Quantum Crypto (PQC) Interoperability project began as a hackathon project at the IETF in 2022. Interested individuals added PQ algorithm support into open-source or proprietary tools, collaborating using... Read More
The SP 800-90B approved health tests detect a particular class of failures, with cutoffs set under implicit assumptions. This talk reviews relevant SP 800-90B requirements, explores failure modes detected by... Read More
A FIPS tester finds himself mixed up in a series of peculiar, absurd, but eerily familiar scenarios on the way to the Test Lab. A Scheme Reviewer dreams of consistently... Read More
With the announcement of the Commercial National Security Algorithm 2.0 (CSNA 2.0) by the NSA in 2022, post-quantum cryptography (PQC) gained significant importance. This talk will discuss the approved algorithms... Read More
Due to the nature of the SP 800-90B requirements, entropy sources often implement only the minimum required testing, namely the adaptive proportion test (APT) and repetition count test (RCT). This... Read More
There have been at least 130 entropy source certificates awarded by the ESVP so far. In this talk, the speaker will summarize lab, implementation, and vendor trends based on information... Read More
Vendors are required to submit their cryptographic module implementations to the Cryptographic Module Validation Program (CMVP) for validation and qualification of their products or cloud services for deployment within the... Read More
Today, customers utilize various types of PQC algorithms implemented in hardware security modules (HSMs) to safeguard their businesses, with applications ranging from communication security to software signing. Stateful hash-based signature... Read More
Recent developments in the global cybersecurity landscape, such as society’s increasing reliance on interconnected systems, the adoption of connected devices in critical infrastructure, and geopolitical events emphasizing the importance of... Read More
The advent of quantum computing heralds a new era of cryptographic challenges, necessitating a reassessment of traditional security measures, particularly concerning conventional key exchange algorithms. While Post Quantum Cryptography (PQC)... Read More
Collaboration proves pivotal in fostering efficiencies, devising solutions that transcend organizational boundaries, and confronting changes proactively. At Cisco, the Certifications Team collaborates closely with the Common Modules team to develop... Read More
The advent of the quantum computing era marks a pivotal transformation in the cryptographic landscape. Traditional cryptographic algorithms, once deemed impregnable, now face vulnerability to the exponential capabilities of quantum... Read More
The algorithms CRYSTAL-Cyber, CRYSTAL-Dilithium, SPHINCS+, and FALCON form the basis of FIPS202, FIPS203, and FIPS204. Selected by NIST after rigorous testing for various resources, these algorithms emerged as optimal choices.... Read More
Timing side-channels are often within the threat model of software implementations of cryptographic algorithms. However, there have been instances of subtle bugs in implementations during the NIST PQC standardization. Kyberslash... Read More
GenAI technology holds promise for enhancing various aspects of life but also carries significant risks. A key risk is the inability to discern authentic from synthetic content, leading to the... Read More
Section 7.10 of the FIPS 140-3 Management Manual outlines operational equivalency for hardware modules, enabling labs to conduct minimal regression testing across multiple platforms differing in storage, interfaces, and power... Read More
In today’s rapidly evolving security and technological landscape, the need for robust inventory systems for cryptographic assets is paramount. Yet, discussions regarding their implementation for effective business outcomes, particularly amidst... Read More
OpenSSL 3.0 introduces a provider-based architecture, revolutionizing the library’s design by offering a flexible approach to adding, configuring, and utilizing cryptographic algorithms. However, this poses challenges on more restrictive operating... Read More
Thirty years after the publication of FIPS 140-1, technology has evolved, but the standard has not kept pace. This talk will review the physical security requirements of single-chip embodiments, addressing... Read More
Most modern cloud-based Key Management Systems (KMS) rely heavily on Cloud Service Providers (CSPs), posing challenges in understanding key management and security practices. PQKMS, a cloud-based KMS designed for both... Read More
This talk will explore the concept of ‘Module Component Pre-Validation Packages’ as a means to facilitate compliance, streamline testing processes, and promote reusability within the realm of ISO/IEC 19790 and... Read More
Before the Internet fully adopts lattice-based cryptography, it’s crucial to examine past, current, and potential future methods for attacking its foundations. This talk will offer an overview of lattice basis... Read More
Modes of operation have long been established in cryptography as a way to add functionality to an underlying cryptographic technique. Most of the work on modes historically has focused on... Read More
The talk aims to discuss the current validation process for Applets executing on JAVA cards and explore the potential for decoupling the FIPS validation of an applet from the underlying... Read More
In this talk, the experience of adding support for upcoming FIPS 203 ML-KEM (Kyber) and FIPS 204 ML-DSA (Dilithium) post-quantum algorithms to hardware crypto modules will be described. Technical challenges... Read More
ANSI X9 and ISO have completed or are nearing completion of standards that will help transform the payment network security of tomorrow. Join for an update on the recent and... Read More
In the upcoming PQC transition, deploying new algorithms at scale requires careful evaluation and preparation to ensure security and zero customer impact. AWS has been deploying the new PQC algorithms... Read More
The market has two use-cases for writing custom firmware for a hardware security module — Converting a multi-operation workflow on the host to a single transaction on the HSM, and/or... Read More
Thirty years ago, a transformative breakthrough occurred: humanity gained the ability to transpose millennia of trusted commercial practices into the digital world. This talk explores the profound impact of public-key... Read More
This talk examines how the quantum threat to cryptography informs a post-quantum cryptography migration strategy across products and solutions. The discussion highlights the importance of beginning migration efforts with the... Read More
The transition to post-quantum cryptography (PQC) offers opportunities to reshape and strengthen the security landscape. This talk explores innovative approaches, including hybrid cryptography, crypto-agility through Cryptography as a Service, and... Read More
Building multi-layer protection and staying agile to adapt to changes in the security landscape are essential strategic goals. However, translating these goals into concrete actions presents challenges for both public... Read More
Cryptographic inventories enable organizations to identify cryptographic algorithms, protocols, and libraries used within their networks. Ideally, they would provide an easy-to-understand list of cryptographic assets, but in practice, they often... Read More
The speaker will walk through some real-world experiences as the market shifts to meet PQC-Ready code signing mandates. This talk will outline how some organizations are already moving forward utilizing... Read More
This panel discussion will address practical implications for tech companies and industries reliant on current cryptographic standards. Topics include the adoption of post-quantum cryptography (PQC) by major organizations, technical hurdles... Read More
This talk examines the current state of the Cryptographic Module Validation Program (CMVP) operations and recent programmatic activities related to FIPS 140-3 cryptographic modules.
With finalized PQC standards, deployments are increasing, prompting discussions on strategies and lessons learned from real-world projects. This talk will provide updates on crypto discovery and control, the use of... Read More
The latest version of ISO/IEC 19790, Security Requirements for Cryptographic Modules, introduces a cleaner, updated set of requirements for cryptographic modules. However, due to the general nature of the standard,... Read More
On July 23–25, 2024, NIST hosted the Workshop on Formal Methods within Certification Programs (FMCP 2024). The goal of this three-day workshop was to explore the use of formal methods... Read More
This talk examines the experimental implementation of PQC algorithms into TLS 1.3 using X.509 catalyst certificates, featuring two public keys and two digital signatures. Managed by the X9F5 Financial PKI... Read More
As the adoption of NIST-approved PQC algorithms accelerates, hardware implementations of algorithms such as ML-KEM Kyber and ML-DSA Dilithium are becoming crucial. This talk emphasizes the importance of formal verification... Read More
The BSI annually updates the technical guideline TR 02102, Cryptographic Mechanisms: Recommendations and Key Lengths, which provides cryptographic recommendations over a seven-year period. The TR 02102 consists of four parts,... Read More
This talk highlights the urgent need for secure and efficient post-quantum cryptographic systems, given quantum computing’s potential to compromise traditional encryption. It explores how formal verification tools can ensure the... Read More
The Falcon lattice-based signature scheme (upcoming NIST FIPS 206 FN-DSA) introduces complexities in validation due to its use of floating-point arithmetic, which can generate different keys or signatures from the... Read More
HSMs are used extensively In manufacturing to protect the keys used to sign firmware and other artifacts meant for smart devices. Managing these signing operations to prevent private key misuse... Read More
As quantum computing technology advances, the cybersecurity landscape faces unprecedented challenges, particularly in payment processing systems. This talk will explore the vulnerabilities of traditional cryptographic algorithms, foundational to securing financial... Read More
Chris Celi discuss how the ACVMP Project will be integrated into the Cryptographic Module Validation Program (CMVP) upon its completion in September 2025, offering insights into the future of the... Read More
Lattice-based schemes are emerging as leading candidates for post-quantum cryptography, while threshold cryptography is becoming essential for enhancing security in decentralized and distributed systems. This talk provides a comprehensive overview... Read More
Financial services emphasize regulatory compliance, making the migration of workloads from on-premises to the cloud challenging due to the need to meet regulatory requirements. The ANSI standard X9.125, Cloud Management... Read More
Hardware security modules (HSMs) are extensively used in manufacturing to protect the keys used for signing firmware and other artifacts intended for smart devices. A less frequently discussed but equally... Read More
Most labs and vendors involved in FIPS 140 evaluations are familiar with the basics of the NIST Automated Cryptographic Validation Test System (ACVTS). Although the ACVTS was developed for NIST-approved... Read More
This talk summarizes recent updates to NIAP Policy 5, including Addendum 1 (FAQs) and the NIAP CAVP mapping table. It also reviews the latest modifications for Intel CPU equivalency and... Read More
The creation of the security policy (SP) document has changed as part of the FIPS 140-3 validation process. It is now auto-generated following guidance from Special Publication 800-140BR1 (SP 800-140BR1).... Read More
The Store-Now-Decrypt-Later aspect of the post-quantum cryptography (PQC) migration problem has become a focal point due to concerns that attackers are already collecting encrypted secrets for future decryption. While this... Read More
With NIST publishing the first standards for PQC, organizations may wonder about next steps. This talk will share the Canadian Centre for Cyber Security’s guidance on the use of cryptography... Read More
Hardware modules need to be able to both prevent and detect attempts to physically compromise sensitive information. One of the most common methods of detection is the use of tamper... Read More
In an era of disinformation, exacerbated by rapidly advancing AI tools, the creation of seemingly authentic fake content poses significant dangers, including reputational damage and societal harm. Cryptographic provenance technologies... Read More
This talk explores post-quantum cryptographic adaptations for the GlobalPlatform Secure Channel Protocol 11 (SCP11) in the context of eSIM remote management. The discussion will include challenges in migrating constrained devices,... Read More
In this session, the CMVP automation team from AWS, Mitre, and ITC Federal shares the cloud architecture and services enabling the CMVP automation project. The team discusses the history of... Read More
With the ever increasing spike of submissions, stakeholders, desire for reuse, and overload of work for everyone, how can a vendor streamline their engagement by jumping in with both feet?... Read More
This talk will focus on lessons learned from integrating FIPS-validated PQ cryptography into open-source projects, including libraries such as the Amazon Corretto Crypto Provider (ACCP) and AWS Libcrypto for Rust... Read More
The transition to FIPS 140-3 introduced significant challenges and concerns as the program incorporated additional changes. These changes led to an extended validation timeline of nearly two years. To address... Read More
As future cryptographic schemes may require handling hybrid digital signatures, hardware security modules (HSMs) will play a critical role in protecting trust authorities by managing key life cycles as bounded... Read More
As hardware security modules (HSMs) with post-quantum cryptography (PQC) capabilities become available, companies with existing public key infrastructure (PKI) and related security service offerings face challenges integrating these new devices... Read More
As organizations face escalating cyber threats and the advent of quantum computing, maintaining Software Bills of Materials (SBOMs) and Cryptographic Bills of Materials (CBOMs) is a crucial step to providing... Read More
Easychair Submission #17: Payment systems are uniquely high-impact in their relevance to everyday consumers. When innovations such as SoftPOS or Tap-to-Pay emerge, the end user literally holds them in the... Read More
This talk focuses on lessons learned in making PQC available to customers with FIPS requirements, beginning with critical cryptographic services. The discussion addresses preferred key agreements, the deployment of x25519,... Read More
This talk introduces upcoming updates to the ESV Public Use Document templates, effective as of November 2024. It describes the changes and expectations and provides an opportunity for audience feedback.
This panel, led by Michele Mosca, discusses quantum readiness in the present day. It examines how large organizations, particularly in government and financial sectors, are preparing for the quantum threat... Read More
The ML-KEM post-quantum cryptography (PQC) algorithm recently achieved standardization with the publication of NIST FIPS-203. A reference design and the liboqs library provide implementations of this and other PQC algorithms;... Read More
Software modules are a critical component of the Federal Information Processing Standard (FIPS) 140-3 certification, constituting the majority of certified cryptographic modules. However, the complexity and length of the validation... Read More
Lattice-based cryptography leads the field of post-quantum cryptography, offering resilience against quantum attacks and design flexibility. However, selecting appropriate parameters for these schemes is often perceived as overly complex. This... Read More
NIST is currently revising SP 800-90A, the section of the NIST random number generator (RNG) standards addressing deterministic random bit generators (DRBGs) and their use. This talk outlines the planned... Read More
This talk addresses the compliance challenges posed by seemingly contradictory standards requirements, such as FIPS 140-3, which dictates the use of classical algorithms, and CNSA 2.0, which requires a transition... Read More
ANSI X9 and ISO are developing standards that will transform key management and key block validation practices. This talk provides updates on these standards, addressing topics such as the transportation... Read More
The generation of post-quantum cryptography (PQC) keys for Trusted Computing Group (TCG) Device Identifier Composition Engine (DICE) layers presents unique challenges in complying with NIST’s PQC algorithm standards. TCG DICE... Read More
Numerous certificate mechanisms have been proposed for transitioning to post-quantum cryptography, many involving hybrid cryptography. For existing systems, moving from traditional algorithms to post-quantum algorithms often requires a transition period... Read More
The threats posed by quantum computing to traditional cryptographic methods necessitate the evolution of cryptographic software. This talk examines the OpenSSL project’s approach to advancing in alignment with the new... Read More
Hybrid key encapsulation mechanisms (KEMs) and hybrid signature schemes combining PQC algorithms with RSA or elliptic curve cryptography are emerging across various protocol specifications. This talk examines the standardization of... Read More
Entropy sources and random number generators (RNGs) often use deterministic processing to improve the quality of raw noise source bits or raw random numbers. In SP 800-90B, this is referred... Read More
From one perspective, the shift to PQC algorithms is just another cryptographic transition, familiar to financial services. However, this transition is significant, complicated, and open-ended. Competitors have become collaborators, as... Read More
Pre-silicon side-channel leakage assessments allow vulnerabilities to be identified and mitigated early in the design process. This talk addresses the challenges of applying traditional Test Vector Leakage Assessment (TVLA) methodologies... Read More
The certification of entropy sources under SP 800-90B presents challenges when incorporating quantum-derived randomness. The standard requires entropy contributions from a single noise source and mandates vetted conditioning components for... Read More
Post-quantum cryptography (PQC) algorithms raise questions about side-channel vulnerabilities and their mitigation, paralleling the challenges faced by classical algorithms like RSA. This talk introduces an approach for detecting side channels... Read More
As quantum computing progresses, the demand for high-quality random numbers in cryptographic applications continues to grow. This talk examines advanced randomness generation techniques, focusing on the technical foundations of scaling... Read More
The mobile industry, with its unique characteristics, has been preparing for the transition to quantum-resistant cryptography for many years. As truly global standards, 4G and 5G require algorithms that are... Read More
This talk explores the practical and compliance-related challenges vendors encounter when updating cryptographic modules as early adopters of post-quantum-safe (PQ-safe) cryptography. While support for fundamental PQ-safe mechanisms in cryptographic libraries... Read More
This talk will cover the following topics: How the challenges have been handled, What is being done to manage the issue list, How engagement with communities is being fostered. The... Read More
Low-level hardware roots of trust perform critical roles in various devices. Their services include secure boot and attestation, leveraging asymmetric cryptography, which requires updates to support newly standardized post-quantum algorithms.... Read More
Side-channel attacks are a common threat to cryptographic implementations. Unfortunately, most available tooling to combat this threat has limited usability, especially in black-box testing scenarios. This talk presents lessons learned... Read More
Transitioning to Post-Quantum Cryptography (PQC) is essential for securing software, data, and communications against emerging quantum threats. One major challenge that device manufacturers face now is the limited availability of... Read More
With the recent release of the NIST post-quantum cryptography (PQC) standards, the race is on to integrate them into the next generation of product designs and manufacturing flows. Unfortunately, this... Read More
With the recent standardization of some post-quantum cryptography algorithms, NCC Cryptography Services has had the opportunity to review various implementations. During this talk, the speaker will highlight the categories of... Read More
The Internet of Things (IoT) faces an unprecedented threat from quantum computing advancements. This talk explores the necessity of a defense-in-depth, quantum-safe IoT architecture guided by FIPS validation standards. It... Read More
The newly published NIST post-quantum cryptography (PQC) standards enable cyber systems to address quantum threats. This talk highlights the impacts of introducing PQC to the cybersecurity ecosystem, including its effects... Read More
As a provider of cryptographic modules and cloud services, Oracle must use FIPS 140 validated modules in cloud systems to meet certain procurement requirements and pass FedRAMP audits. Oracle also... Read More
With decades of security vulnerabilities tied to memory-unsafe languages, memory-safe programming has become a priority for reducing security risks and enhancing productivity. Echoing this trend, the White House Office of... Read More
Although stateful hash-based signature schemes were published in NIST SP 800-208 in October 2020, their adoption in final products has been relatively recent. This talk examines how LMS has been... Read More
When you need to store critical private keys securely, the answer is simple: buy an HSM. Need a PKI setup and secure critical private keys? Again, not a problem—buy an... Read More
The publication of FIPS 203, 204, and 205 marks a step forward in enabling more consistent use of PQC algorithms. However, interoperability between vendor implementations remains a challenge. The OASIS... Read More
As quantum computing threatens traditional cryptography, securing AI-driven systems becomes critical. This session explores Quantum-Resistant Cryptography (QRC) and its role in safeguarding data. Through real-world case studies and a live... Read More
The Open Quantum Safe (OQS) project provides researchers with a software testbed for experimentation to aid the transition to post-quantum cryptography. As post-quantum standards mature, OQS aims to release a... Read More
The Cryptographic Module Validation Program (CMVP) frequently validates cryptographic libraries and software modules based on specific algorithms, assuming that calling applications will integrate the library functions to manage key handling... Read More
Among the many developments in the journey to quantum safety, the differences in how Key Encapsulation Algorithms (KEMs) behave compared to traditional Key Agreement and Key Transport protocols are some... Read More
Cryptographic Module User Forum (CMUF) Plenary consisting of: 1. A summary discussion of major accomplishments over the past year, 2. Audience participation in a fun game to test your knowledge... Read More