12.07.2015 Views

DCI Specs - Digital Cinema Initiatives

DCI Specs - Digital Cinema Initiatives

DCI Specs - Digital Cinema Initiatives

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Nr 10 – Design Assurance requirements may meet Security Level 2requirements.• Nr 1 and Nr 11 – Vendor-specified Security Policy specifications shall be inalignment with and fully support the requirements of this <strong>Digital</strong> <strong>Cinema</strong>specification, in addition to vendor-specific policies.Nr Section Security Level 1 Security Level 2 Security Level 3 Security Level 41 CryptographicModuleSpecification2 CryptographicModule PortsAnd Interfaces3 Roles, ServicesAndAuthentication4 Finite StateModel5 PhysicalSecurity6 OperationalEnvironment7 CryptographicKeyManagementSpecification of cryptographic module, cryptographic boundary, Approved algorithms,and Approved modes of operation. Description of cryptographic module, including allhardware, software, and firmware components. Statement of module security policy.Required and optional interfaces.Specification of all interfaces and of allinput and output data paths.Logical separationof required andoptional roles andservices.Role-based oridentity-basedoperatorauthentication.Data ports for unprotected criticalsecurity parameters logically separatedfrom other data ports.Identity-based operator authentication.Specification of finite state model. Required states and optional states. State transitiondiagram and specification of state transitions.Production grade Locks or tamper Tamper detection Tamper detect &equipment. evidence.and response for response. EFPSingle operator.Executable code.Approved integritytechnique.Referenced PPsevaluated at EAL2with discretionaryaccess controlmechanisms andauditing.covers and doors.Referenced PPsplus trusted pathevaluated at EAL3plus security policymodeling.and EFT.Referenced PPsplus trusted pathevaluated atEAL4.Key management mechanisms: random number and key generation, keyestablishment, key distribution, key entry/output, key storage, & key zeroization.Secret and private keys established usingmanual methods may be entered oroutput in plaintext form.8 EMI/EMC 47 CFR FCC Part 15. Subpart B, Class A(Business use). Applicable FCCrequirements (for radio).9 Self-Tests Power-up tests: cryptographic algorithmtests, software/firmware integrity tests,10 DesignAssurance-- Mitigation ofOther Attackscritical functions tests. Conditional tests.Configuration CM system.management Secure distribution.(CM). Secure Functionalinstallation and specification.generation. Designand policycorrespondence.Guidancedocuments.Secret and private keys establishedusing manual methods shall be enteredor output encrypted or with splitknowledge procedures.47 CFR FCC Part 15. Subpart B, ClassB (Home use).Statistical RNGtests. Callable ondemandHigh-levellanguageimplementation.Statistical RNGtests performed atpower-up.Formal model.Detailedexplanations(informal proofs).Pre/postconditions.Specification of mitigation of attacks for which no testable requirements are currentlyavailable.Table 20: Summary of FIPS 140-2 Security Requirements 29Table 20 does not reflect the most current FIPS 140-2 table, and shall be considered informative(refer to FIPS 140-2 publications for the most current version of this table).29 From Section 4 of [FIPS PUB 140-2]<strong>DCI</strong> <strong>Digital</strong> <strong>Cinema</strong> System Specification v.1.2 Page 139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!