d. Hardware cryptographic modules
3. c. Multiple-chip embedded cryptographic modules are physical embodiments in which two or more integrated circuits (IC) chips are interconnected and are embedded within an enclosure or a product that may not be physically protected. Examples of such implementations include adapters and expansion boards. Note that the security measures provided to these modules vary with the security levels of these modules.
The other three choices are incorrect because they are not used in the implementation of adapters and expansion boards. Single-chip cryptographic modules are physical embodiments in which a single IC chip may be used as a standalone module or may be embedded within an enclosure or a product that may not be physically protected. Multiple-chip standalone cryptographic modules are physical embodiments in which two or more IC chips are interconnected and the entire enclosure is physically protected. Cryptographic modules can be implemented in software, hardware, firmware, and hybrid.
4. Regarding cryptography, which of the following externally indicates that the physical security of a cryptographic module was compromised?
a. Tamper attempt
b. Tamper evidence
c. Tamper detection
d. Tamper response
4. b. Tamper is an unauthorized modification that alters the proper functioning of a cryptographic module or automated information system security equipment in a manner that degrades the security or functionality it provides. Tamper evidence is the external indication that an attempt has been made to compromise the physical security of a cryptographic module. The evidence of the tamper attempt should be observable by the module operator subsequent to the attempt.
The other three choices are incorrect because do not indicate a compromise and their actions are internal. Tamper attempt means that an attacker has made a serious try to defeat the physical security of a cryptographic module. Tamper detection is the automatic determination by a cryptographic module that an attempt has been made to compromise the physical security of the module. Tamper response is the automatic action taken by a cryptographic module when a tamper attempt has been detected.
5. Which of the following are not substitutes for tamper evidence of a cryptographic module?
a. Tamper detection and tamper response
b. Tamper attempt and tamper prevention
c. Tamper prevention and tamper detection
d. Tamper prevention and tamper correction
5. a. For cryptographic module, tamper detection and tamper response are not substitutes for tamper evidence. Tamper evidence is the external indication that an attempt has been made to compromise the physical security of a cryptographic module. The sequence of events taking place is as follows: Tamper prevention comes first, detection comes next or at the same time as prevention, evidence comes next or at the same time as detection, and response or correction comes last. The evidence of a tamper attempt should be observable by the module operator subsequent to the attempt. Tamper detection is the automatic determination by a cryptographic module that an attempt has been made to compromise the physical security of the module. Tamper response is demonstrated through tamper correction, which is the automatic action taken by a cryptographic module when a tamper attempt has been detected.
6. Which of the following analyzes the variations of the electrical power consumption of a cryptographic module to extract information about cryptographic keys?
a. Timing analysis attack
b. Differential power analysis attack
c. Simple power analysis attack
d. Electromagnetic emanation attack
6. b. Differential power analysis attack (side-channel attack) considers the variations of the electrical power consumption of a cryptographic module to correlate to cryptographic keys used in a cryptographic algorithm.
The other three choices are incorrect because they do not consider the power differential. A timing analysis attack is an attack on a cryptographic module that is based on an analysis of time periods between the time a command is issued and the time the result is obtained. A simple power analysis attack considers the patterns of instruction execution to reveal the values of cryptographic keys. An electromagnetic emanation attack uses signals to disclose information that is transmitted, received, handled, or processed by any equipment.
7. Which of the following physical security devices is authorized for the protection of unclassified and nonsensitive IT assets?
a. Smart cards
b. Memory cards
c. Hardware tokens
d. Physical tokens
7. d. The physical tokens are authorized for the protection of nonmission-critical, unclassified, and nonsensitive IT assets. Physical tokens consist of keys and unique documents, such as hand-carried orders. When the smart card is used as a repository of information without requiring the cardholder to input a PIN or without presenting a biometric reference sample, the smart card is implemented as a memory card. Hardware tokens can be integrated into either a physical access control or logical access control solution.
8. From a cryptographic module’s physical security viewpoint, tamper-evident seals or pick-resistant locks are placed on covers or doors to protect against unauthorized physical access to which of the following?
a. Environmental equipment
b. Critical security parameters
c. Configuration management system
d. Data center furniture
8. b. Tamper-evident coatings or seals or pick-resistant locks are placed on removable covers or doors of the cryptographic module so that they must be broken to attain physical access to the critical security parameters (CSPs). The other three choices do not use pick-resistant locks because they are not high risk.
9. The cryptographic modules that contain software must provide for which of the following to prevent and detect the disclosure and modification of critical security parameters?
1. Encryption
2. Authentication
3. Fluctuations in temperature
4. Fluctuations in voltage
a. 1 only
b. 2 only
c. 1 and 2
d. 1, 2, 3, and 4
9. d. The cryptographic modules that contain software must provide for the encryption and authentication of all retained parameters and integrity test code when the module is not in use. In addition, environmental failure protection mechanisms that protect the module from fluctuations in temperature and voltage are needed.
10. The highest security level of cryptographic modules requires the environmental failure protection from which of the following?
1. Nonvisual radiation examination
2. Electro-static discharge
3. Radiation fault induced attacks
4. Tamper detection response circuitry
a. 1 and 2
b. 1 and 3
c. 3 and 4
d. 1, 2, 3, and 4
10. d. The highest security level of cryptographic modules requires environmental failure protection from nonvisual radiation examination, protection from electro-static discharge, protection from radiation fault induced attacks for multichip embodiments, and protection of the tamper detection response circuitry from disablement.