1. Security Testing of a Hardware Virtual Private Network Crypto Module
- Author
-
Zaletel, Anže, Žužek, Jaka, Horvat, Lavra, Zupan, Katja, Železnik, Sara, Goršič, Nina, and Lipušček, Maruša
- Subjects
testiranje ,šifriranje podatkov ,analiza trga ,udc:004.056 ,informacijska varnost ,kripto-modul - Abstract
Namen prispevka: Namen prispevka je predstaviti projekt varnostnega testiranja v razvoju in produkciji fizičnega kripto-modula, ki je nujno potrebno pred lansiranjem izdelka na trg. Delo na projektu je bilo usmerjeno v izdelek Code 1 Secure (v nadaljevanju VPN kripto-modul C1S), za katerega je bila narejena primerjava s sorodnimi izdelki, predlagane različne ergonomične oblike ter opisani postopki potrebnih testiranj izdelka za pridobitev certifikatov oz. za doseganje standardov. Metode: Uporabljena je bila deskriptivna metoda s pomočjo študije primarnih in sekundarnih virov. Za potrebe opisa orodij za avtomatizirano testiranje smo delovanje orodij preizkusili in opravili vzorčna testiranja. Ugotovitve: Testiranje programske opreme in njene združljivosti s šifrirnimi algoritmi predstavlja najzahtevnejši del testiranj. Ključno stičišče projekta je predstavljal kolaboracijski portal, preko katerega se je evidentiral in spremljal napredek dela. S preizkušanjem orodij za avtomatizacijo opravil je bilo ugotovljeno, da avtomatizirano testiranje prihrani veliko časa in denarja. Omejitve/uporabnost raziskave Projektno delo je bilo ciljno naravnano na izdelek VPN kripto-modula C1S, zato se tudi ugotovitve navezujejo nanj. Kljub temu lahko ugotovitve apliciramo na sorodne izdelke. Praktična uporabnost: S primerjavo sorodnih izdelkov se pokažejo konkurenčne prednosti VPN kripto-modula C1S pred podobnimi izdelki na trgu ter možnosti za izboljšave. Predlagane so različne ergonomične oblike izdelka glede na ciljne skupine kupcev. Opis možnih testiranj, ki so potrebna za VPN kripto-modul C1S, poda okvirno predstavo o obsegu preizkušanj slehernega tehnološkega izdelka. Izvirnost/pomembnost prispevka: Glede na povišan trend zlorab v kibernetskem prostoru je področje kibernetske varnosti, v katerega spada tudi VPN kripto-modul C1S, izrednega pomena. Za ustrezno delovanje kripto-modulov in doseganje pričakovanj uporabnikov je te naprave pomembno dobro testirati. Purpose: The purpose of the paper is to present security testing approach in the phase of development and production of a hardware crypto-module, which is indispensable before the product goes on the market. The project work was focused on the product Code 1 Secure (from here on VPN crypto module C1S) for which a comparison with other similar products was made, different ergonomically designed shapes were proposed and product’s necessary testing to gain certificates or/and achieve certain standards was described. Design/Methods/Approach: A descriptive method with the study of primary and secondary sources was used. For the purposes of showing how the automated testing tools work, several testing activities were made. Findings: Testing the software and software’s compatibility with encryption algorithms poses the most difficult part of all the testing activities needed to be done. The collaborative web portal had a major role in keeping track and progress of the project’s work. Testing some of the automated tools showed that their usage saves time and consequently money. Research Limitations / Implications: Because the project work was focused on the product VPN crypto module C1S, all the findings are linked to it. However, most of them could be applied to related products. Practical Implications: Comparison of similar products shows competitive edge of VPN crypto module C1S and points out potentials for improvements. There were some ergonomically designed shapes presented with the intention of targeting certain costumers. Description of potential testing needed for the C1S, gives a rough estimate of testing’s scope of every technological product. Originality/Value: VPN crypto-module is a subject of cyber security which has a great importance in everyday life, because of the increased trend of abuses in cyberspace. For the proper functioning of the crypto-modules and meet the expectations of the users, these devices must be appropriately tested.
- Published
- 2020