{"id":785,"date":"2024-02-05T18:16:49","date_gmt":"2024-02-05T17:16:49","guid":{"rendered":"http:\/\/10.0.1.197\/?page_id=785"},"modified":"2024-09-11T06:15:25","modified_gmt":"2024-09-11T04:15:25","slug":"cryptographic-algorithm-testing","status":"publish","type":"page","link":"http:\/\/192.168.0.78\/services\/cryptographic-testing\/cryptographic-algorithm-testing\/","title":{"rendered":"\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5"},"content":{"rendered":"\n
\n
\n
\n
\n
\n

\u5bc6\u7801\u6d4b\u8bd5<\/p>\n\n\n\n

\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5<\/h1>\n\n\n\n

\u54a8\u8be2\u6211\u4eec\u7684\u4e13\u5bb6\u3002\u6211\u4eec\u5f88\u9ad8\u5174\u4e3a\u60a8\u63d0\u4f9b\u652f\u6301\u3002<\/p>\n\n\n\n

\n
\u8054\u7cfb\u6211\u4eec<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n \n \n <\/path>\n \n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n <\/path>\n \n <\/path>\n <\/g>\n <\/path>\n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n <\/g>\n <\/g>\n
\n
\n
\n
\n
\n
\n

NIST \u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u7a0b\u5e8f\uff08CAVP\uff1aCryptographic Algorithm Validation Program\uff09\u63d0\u4f9b\u5df2\u6279\u51c6\uff08\u5373 FIPS \u6279\u51c6\u548c NIST \u63a8\u8350\uff09\u5bc6\u7801\u7b97\u6cd5\u53ca\u5176\u5404\u4e2a\u7ec4\u4ef6\u7684\u9a8c\u8bc1\u6d4b\u8bd5\u3002\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u662f\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u7684\u5148\u51b3\u6761\u4ef6\u3002<\/p>\n\n\n\n

atsec\u63d0\u4f9b\u7684\u670d\u52a1\uff1a<\/h3>\n\n\n\n

atsec \u7f8e\u56fd\u901a\u8fc7\u5176\u8ba4\u53ef\u7684\u5bc6\u7801\u5b89\u5168\u6d4b\u8bd5\uff08CST\uff1aCryptographic Security Testing\uff09\u5b9e\u9a8c\u5ba4\uff08NVLAP\u5b9e\u9a8c\u5ba4\u4ee3\u7801#200658-0\uff09\u63d0\u4f9bNIST\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u8ba1\u5212\uff08CAVP\uff09\u89c4\u5b9a\u7684\u7b97\u6cd5\u6d4b\u8bd5\uff1b\u53ef\u7531\u6388\u6743\u5b9e\u9a8c\u5ba4\u6d4b\u8bd5\u7684\u5bc6\u7801\u7b97\u6cd5\u5217\u8868\u5df2\u5728CAVP\u7f51\u9875\u4e0a\u5217\u51fa<\/a>\u3002<\/p>\n\n\n\n

atsec \u4e5f\u9488\u5bf9NIST \u81ea\u52a8\u5bc6\u7801\u9a8c\u8bc1\u6d4b\u8bd5\u7cfb\u7edf\uff08ACVTS\uff1aAutomated Cryptographic Validation Testing System\uff09\u63d0\u4f9b\u5168\u9762\u652f\u6301\uff0c\u5305\u62ec\u57f9\u8bad\u60a8\u7684\u56e2\u961f\u719f\u7ec3\u638c\u63e1 NIST \u7ef4\u62a4\u7684\u6d4b\u8bd5\u7cfb\u7edf\uff0c\u5e76\u63d0\u4f9b\u4f7f\u7528\u6307\u5357\u548c\u4e13\u4e1a\u77e5\u8bc6\u3002\u6211\u4eec\u53ef\u4ee5\u5e2e\u52a9\u60a8\u5feb\u901f\u638c\u63e1\u65b0\u7684\u77e2\u91cf\u683c\u5f0f\u3001\u65b0\u53ef\u6d4b\u8bd5\u7684\u5bc6\u7801\u4ee5\u53ca\u67e5\u8be2\u6f14\u793a\u548c\u751f\u4ea7\u670d\u52a1\u5668\u3002<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

\u6743\u5a01\u673a\u6784\u5b98\u65b9\u7f51\u7ad9\uff1a<\/h3>\n<\/div>\n\n\n\n
\n
\n

\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u4f53\u7cfbCryptographic Algorithm Validation Program<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n<\/div>\n\n\n\n
<\/div>\n\n\n\n
\n

\u66f4\u591a\u4fe1\u606f\uff1a<\/h3>\n<\/div>\n\n\n\n
\n
\n

NIST ACVP \u534f\u8bae (GitHub)<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n\n\n\n
\n

atsec ACVP Proxy & Parser (GitHub)<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n\n\n\n
\n

CAVP \u5e38\u89c1\u95ee\u9898 FAQ (PDF)<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n\n\n\n
\n

CAVP \u7ba1\u7406\u624b\u518c Management Manual (PDF<\/a>)<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\"\"\n\t\t\t\n\t\t\t\t\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n\n
\n
\n
\n

\u4e3a\u4ec0\u4e48\u6211\u4eec\u7684\u670d\u52a1\u5bf9\u60a8\u5f88\u91cd\u8981\uff1a<\/h3>\n\n\n\n

\u6d4b\u8bd5\u5bc6\u7801\u7b97\u6cd5\u662f\u5426\u6b63\u786e\u5b9e\u65bd\u662f FIPS 140-3 \u5bc6\u7801\u6a21\u5757\u6d4b\u8bd5\u3001NIAP Common Criteria\u8bc4\u4f30\u4ee5\u53ca\u5176\u4ed6\u63a5\u53d7 NIST CAVP \u8bc1\u4e66\u7684\u9009\u5b9a\u901a\u7528\u6807\u51c6\u65b9\u6848\u548c\u8ba4\u8bc1\u7a0b\u5e8f\u7684\u5148\u51b3\u6761\u4ef6\u3002<\/p>\n\n\n\n

\u4f9b\u5e94\u5546\u786e\u5b9e\u53ef\u4ee5\u9009\u62e9\u81ea\u5df1\u8bbf\u95ee ACVTS\uff0c\u4f46\u8fd9\u4f1a\u5e26\u6765\u8bb8\u591a\u6311\u6218\uff0c\u4f8b\u5982\u9700\u8981\u4e3a\u9879\u76ee\u6295\u5165\u8d44\u6e90\u3001\u4e86\u89e3\u5982\u4f55\u64cd\u4f5c\u5de5\u5177\u4ee5\u53ca\u83b7\u5f97 NVLAP \u8ba4\u8bc1\u3002\u901a\u5e38\uff0c\u5c06\u8fd9\u9879\u5de5\u4f5c\u5916\u5305\u7ed9\u83b7\u5f97\u8ba4\u8bc1\u7684\u5b9e\u9a8c\u5ba4\uff08\u5982 atsec \u7f8e\u56fd\u7684 CST \u5b9e\u9a8c\u5ba4\uff09\u4f1a\u66f4\u52a0\u9ad8\u6548\u3002<\/p>\n\n\n\n

\u4e3a\u4e86\u5c3d\u53ef\u80fd\u51cf\u5c11\u6d4b\u8bd5\u8fc7\u7a0b\u7684\u9ebb\u70e6\uff0catsec \u521b\u5efa\u4e86\u89e3\u51b3\u65b9\u6848\uff0c\u4f7f\u5ba2\u6237\u80fd\u591f\u8f7b\u677e\u9ad8\u6548\u5730\u5207\u6362\u5230 ACVTS\uff0c\u5176\u4e2d\u5305\u62ec\u81ea\u52a8\u5bc6\u7801\u9a8c\u8bc1\u534f\u8bae (ACVP) \u4ee3\u7406\u548c ACVP \u89e3\u6790\u5668\u3002<\/p>\n<\/div>\n\n\n\n

\n
\n

\u4e0b\u8f7d\uff1a<\/h3>\n\n\n\n

\u6709\u5173\u60a8\u7684\u8ba4\u8bc1\u5386\u7a0b\u7684\u66f4\u591a\u4fe1\u606f\u3002<\/p>\n<\/div>\n\n\n\n

\n
\n\n\n\n
\n

CAVP \u4fe1\u606f\u8bf7\u6c42 Request for Information<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n

CMVP \u548c CAVP\u7b80\u4ecb<\/h2>\n\n\n\n

\u89c2\u770b\u6211\u4eec\u7684\u52a0\u5bc6\u6a21\u5757\u9a8c\u8bc1\u7a0b\u5e8f\u548c\u52a0\u5bc6\u7b97\u6cd5\u9a8c\u8bc1\u7a0b\u5e8f\u7b80\u4ecb\u89c6\u9891\uff0c\u8fd9\u5c06\u5e2e\u52a9\u60a8\u521d\u6b65\u4e86\u89e3\u8ba4\u8bc1\u8fc7\u7a0b\u3002<\/p>\n<\/div>\n\n\n\n

\n
\n\n\n\n
\n

atsec\u2019s Vimeo\u9891\u9053<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n
\n
\n
\n
\"\"<\/figure>\n\n\n\n
\n

\u8fd8\u6709\u5176\u4ed6\u95ee\u9898\u5417\uff1f<\/p>\n\n\n\n

\u627e\u4e0d\u5230\u60a8\u60f3\u8981\u7684\u4e1c\u897f\uff1f\u8ba9\u6211\u4eec\u6df1\u5165\u4ea4\u6d41\u5427\uff01<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n

\n
\u8054\u7cfb\u6211\u4eec \u2192<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n
\n
\n

FIPS 140-3 \u6d4b\u8bd5<\/a><\/h3>\n\n\n\n

FIPS 140-3 \u89c4\u5b9a\u4e86\u4e0e\u5b89\u5168\u8bbe\u8ba1\u548c\u5b9e\u65bd\u52a0\u5bc6\u6a21\u5757\u76f8\u5173\u7684\u8981\u6c42\uff0c\u5e76\u4e14\u5728\u5168\u7403\u8303\u56f4\u5185\uff0c\u9075\u5b88\u8be5\u8981\u6c42\u7684\u5f3a\u5236\u6027\u8d8a\u6765\u8d8a\u5f3a\u3002<\/p>\n<\/div>\n\n\n\n

\n
\u4e86\u89e3\u66f4\u591a<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n

Entropy Source \u8bc4\u4f30<\/a><\/h3>\n\n\n\n

\u5728\u9002\u7528\u7684\u60c5\u51b5\u4e0b\uff0cCMVP \u8981\u6c42\u6240\u6709 FIPS 140-3 \u6a21\u5757\u9a8c\u8bc1\u63d0\u4ea4\u90fd\u5e94\u8bb0\u5f55\u7b26\u5408 SP 800-90B \u7684\u89c4\u5b9a\u3002<\/p>\n<\/div>\n\n\n\n

\n
\u4e86\u89e3\u66f4\u591a<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n

Common Criteria \u8bc4\u4f30<\/a><\/h3>\n\n\n\n

\u901a\u7528\u8bc4\u4f30\u51c6\u5219\uff08Common Criteria\uff09\uff0c\u4e5f\u5373 ISO\/IEC 15408\uff0c\u662f\u7528\u4e8e\u6307\u5b9a\u548c\u8bc4\u4f30 IT \u4ea7\u54c1\u5b89\u5168\u6027\u7684\u56fd\u9645\u516c\u8ba4\u6807\u51c6\u3002<\/p>\n<\/div>\n\n\n\n

\n
\u4e86\u89e3\u66f4\u591a<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
<\/div>\n\n\n\n
\n
\n

\u4fe1\u606f\u5b89\u5168\u63d0\u4f9b\u5546<\/p>\n\n\n\n

\u8bf7\u9605\u8bfb\u6211\u4eec\u6700\u65b0\u7684\u535a\u5ba2\u6587\u7ae0<\/h2>\n\n\n\n

\u4e86\u89e3\u4fe1\u606f\u5b89\u5168\u7684\u6700\u65b0\u52a8\u6001\u3002\u5728\u6211\u4eec\u7684\u535a\u5ba2\u4e0a\uff0c\u60a8\u53ef\u4ee5\u627e\u5230\u6709\u5173\u6280\u672f\u548c\u653f\u7b56\u6700\u65b0\u53d1\u5c55\u7684\u89c1\u89e3\u548c\u5206\u6790\u3002<\/p>\n<\/div>\n\n\n\n