FIPS 140-2

The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2),[1][2] is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001, and was last updated December 3, 2002.

Its successor, FIPS 140-3, was approved on March 22, 2019, and became effective on September 22, 2019.[3] FIPS 140-3 testing began on September 22, 2020, and the first FIPS 140-3 validation certificates were issued in December 2022.[4] FIPS 140-2 testing was still available until September 21, 2021 (later changed for applications already in progress to April 1, 2022[5]), creating an overlapping transition period of more than one year. FIPS 140-2 test reports that remain in the CMVP queue will still be granted validations after that date, but all FIPS 140-2 validations will be moved to the Historical List on September 21, 2026 regardless of their actual final validation date.[6]

Purpose

Rngtest result of a randomness test using FIPS 140-2

The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and standards for cryptography modules that include both hardware and software components. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. This standard specifies the security requirements that will be satisfied by a cryptographic module. The standard provides four increasing qualitative levels of security intended to cover a wide range of potential applications and environments. The security requirements cover areas related to the secure design and implementation of a cryptographic module. These areas include cryptographic module specification; cryptographic module ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.[7]

Federal agencies and departments can validate that the module in use is covered by an existing FIPS 140-1 or FIPS 140-2 certificate that specifies the exact module name, hardware, software, firmware, and/or applet version numbers. The cryptographic modules are produced by the private sector or open source communities for use by the U.S. government and other regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. A commercial cryptographic module is also commonly referred to as a hardware security module (HSM).

Security levels

FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application.

Level 1

Security Level 1 provides the lowest level of security. Basic security requirements are specified for a cryptographic module (e.g., at least one Approved algorithm or Approved security function shall be used). No specific physical security mechanisms are required in a Security Level 1 cryptographic module beyond the basic requirement for production-grade components. An example of a Security Level 1 cryptographic module is a personal computer (PC) encryption board.

Level 2

Security Level 2 improves upon the physical security mechanisms of a Security Level 1 cryptographic module by requiring features that show evidence of tampering, including tamper-evident coatings or seals that must be broken to attain physical access to the plaintext cryptographic keys and critical security parameters (CSPs) within the module, or pick-resistant locks on covers or doors to protect against unauthorized physical access.

Level 3

In addition to the tamper-evident physical security mechanisms required at Security Level 2, Security Level 3 attempts to prevent the intruder from gaining access to CSPs held within the cryptographic module. Physical security mechanisms required at Security Level 3 are intended to have a high probability of detecting and responding to attempts at physical access, use or modification of the cryptographic module. The physical security mechanisms may include the use of strong enclosures and tamper-detection/response circuitry that zeroes all plaintext CSPs when the removable covers/doors of the cryptographic module are opened.

Level 4

Security Level 4 provides the highest level of security. At this security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access. Penetration of the cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate deletion of all plaintext CSPs.

Security Level 4 cryptographic modules are useful for operation in physically unprotected environments. Security Level 4 also protects a cryptographic module against a security compromise due to environmental conditions or fluctuations outside of the module's normal operating ranges for voltage and temperature. Intentional excursions beyond the normal operating ranges may be used by an attacker to thwart a cryptographic module's defenses. A cryptographic module is required to either include special environmental protection features designed to detect fluctuations and delete CSPs, or to undergo rigorous environmental failure testing to provide a reasonable assurance that the module will not be affected by fluctuations outside of the normal operating range in a manner that can compromise the security of the module.

Operating platform

For Levels 2 and higher, the operating platform upon which the validation is applicable is also listed. Vendors do not always maintain their baseline validations.

Cryptographic Module Validation Program

FIPS 140-2 establishes the Cryptographic Module Validation Program (CMVP) as a joint effort by the NIST and the Communications Security Establishment (CSE) for the Government of Canada

Security programs overseen by NIST and CSE focus on working with government and industry to establish more secure systems and networks by developing, managing and promoting security assessment tools, techniques, services, and supporting programs for testing, evaluation and validation; and addresses such areas as: development and maintenance of security metrics, security evaluation criteria and evaluation methodologies, tests and test methods; security-specific criteria for laboratory accreditation; guidance on the use of evaluated and tested products; research to address assurance methods and system-wide security and assessment methodologies; security protocol validation activities; and appropriate coordination with assessment-related activities of voluntary industry standards bodies and other assessment regimes.

FIPS 140-2 testing in this program

The FIPS 140-2 standard is an information technology security approval program for cryptographic modules produced by private sector vendors who seek to have their products certified for use in government departments and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information.

Tamper evident FIPS 140-2 security labels are utilized to deter and detect tampering of modules.

Laboratories doing the testing

All of the tests under the CMVP are handled by third-party laboratories that are accredited as Cryptographic Module Testing laboratories[8] by the National Voluntary Laboratory Accreditation Program (NVLAP).[9] Vendors interested in validation testing may select any of the twenty-one accredited labs.

NVLAP accredited Cryptographic Modules Testing laboratories perform validation testing of cryptographic modules.[10][11] Cryptographic modules are tested against requirements found in FIPS PUB 140–2, Security Requirements for Cryptographic Modules. Security requirements cover 11 areas related to the design and implementation of a cryptographic module. Within most areas, a cryptographic module receives a security level rating (1–4, from lowest to highest), depending on what requirements are met. For other areas that do not provide for different levels of security, a cryptographic module receives a rating that reflects fulfillment of all of the requirements for that area.

Validation

Flowchart of the validation process for FIPS 140-2

An overall rating is issued for the cryptographic module, which indicates:

  1. the minimum of the independent ratings received in the areas with levels, and
  2. the fulfillment of all the requirements in the other areas.

On a vendor's validation certificate, individual ratings are listed, as well as the overall rating.

NIST maintains validation lists[12] for all of its cryptographic standards testing programs (past and present). All of these lists are updated as new modules/implementations receive validation certificates from NIST and CSE. Items on the FIPS 140-1 and FIPS 140-2 validation list reference validated algorithm implementations that appear on the algorithm validation lists.

Compliance

In addition to using a valid cryptographic module, encryption solutions are required to use cipher suites with approved algorithms or security functions established by the FIPS 140-2 Annex A to be considered FIPS 140-2 compliant.

Annexes

FIPS PUB 140-2 Annexes:

Reception

Steven Marquess has posted a criticism that FIPS 140-2 validation can lead to incentives to keep vulnerabilities and other defects hidden. CMVP can decertify software in which vulnerabilities are found, but it can take a year to re-certify software if defects are found, so companies can be left without a certified product to ship. As an example, Steven Marquess mentions a vulnerability that was found, publicised, and fixed in the FIPS-certified open-source derivative of OpenSSL, with the publication meaning that the OpenSSL derivative was decertified. This decertification hurt companies relying on the OpenSSL-derivative's FIPS certification. By contrast, companies that had renamed and certified a copy of the open-source OpenSSL derivative were not decertified, even though they were basically identical, and did not fix the vulnerability. Steven Marquess therefore argues that the FIPS process inadvertently encourages hiding software's origins, to de-associate it from defects since found in the original, while potentially leaving the certified copy vulnerable.[13]

In recent years, CMVP has taken steps to avoid the situation described by Marquess, moving validations to the Historical List based on the algorithms and functions contained in the module, rather than based on the provenance.[14]

See also

References

  1. ^ "FIPS PUB 140-2: Security Requirements for Cryptographic Modules". NIST. July 26, 2007. Archived from the original on August 25, 2007. Retrieved May 18, 2013.
  2. ^ "Federal Information Processing Standards (FIPS) Publications: FIPS 140--2, Security Requirements for Cryptographic Modules". NIST. May 2001. Retrieved May 18, 2013.
  3. ^ "Announcing Approval and Issuance of FIPS 140-3, Security Requirements for Cryptographic Modules". www.nist.gov. National Institute of Standards and Technology. May 1, 2019. Retrieved May 29, 2019.
  4. ^ "Cryptographic Module Validation Program". www.nist.gov.
  5. ^ "FIPS 140-3 Transition Effort". www.nist.gov. National Institute of Standards and Technology. June 2, 2021. Retrieved August 18, 2021.
  6. ^ "FIPS 140-3 Transition Effort". www.nist.gov. National Institute of Standards and Technology. September 21, 2020. Retrieved October 19, 2020.
  7. ^ "SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES" (PDF). National Institute of Standards and Technology. May 25, 2001. Retrieved January 9, 2014.
  8. ^ "Testing Laboratories". NIST. April 1, 2013. Retrieved May 18, 2013.
  9. ^ "National Voluntary Laboratory Accreditation Program". NIST. Retrieved November 23, 2018.
  10. ^ "Cryptographic Module Validation Program (CMVP)". www.nist.gov. Retrieved August 4, 2015.
  11. ^ "NVLAP Cryptographic and Security Testing LAP". www.nist.gov. Retrieved August 4, 2015.
  12. ^ "Module Validation Lists". NIST. May 13, 2013. Retrieved May 18, 2013.
  13. ^ Steven Marquess. "Secure or Compliant, Pick One". Archived from the original on December 27, 2013.
  14. ^ CMVP. "Implementation Guidance Announcements".

Read other articles:

Disambiguazione – Piermarini rimanda qui. Se stai cercando altri significati, vedi Piermarini (disambigua). Giuseppe Piermarini Giuseppe Giorgio Pietro Baldassarre Piermarini (Foligno, 18 luglio 1734 – Foligno, 18 febbraio 1808) è stato un architetto italiano. Indice 1 Biografia 1.1 Giovinezza e formazione 1.2 Piermarini valente architetto 1.2.1 Accademia di Mantova e università di Pavia 1.2.2 Villa Reale di Monza 1.2.3 Palazzo Belgioioso 1.2.4 Teatro alla Scala 1.3 Ultimi anni ...

Este artigo carece de caixa informativa ou a usada não é a mais adequada. Esta página cita fontes, mas que não cobrem todo o conteúdo. Ajude a inserir referências. Conteúdo não verificável pode ser removido.—Encontre fontes: ABW  • CAPES  • Google (N • L • A) (Julho de 2010)  Nota: Para o mineral, veja Calcedônia (mineral). Para outros significados, veja Calcedônia. Calcedônia, na Anatólia, durante as Guerra...

Neem het voorbehoud bij medische informatie in acht.Raadpleeg bij gezondheidsklachten een arts. Traditionele Chinese geneeskunde Naam (taalvarianten) Vereenvoudigd 中医 Traditioneel 中醫 Pinyin zhōngyī Jyutping (Standaardkantonees) zung1 ji1 Standaardkantonees Chóng Yíe HK-romanisatie (Standaardkantonees) Chung Yee Yale (Standaardkantonees) jung1 yi1 Sichuanhua Dzong Ie Chinese medicijnwinkel in Tsim Sha Tsui, Hongkong. Traditionele Chinese geneeskunde, ook bekend als Chinese geneesku...

Naval Facility Point SurShow map of CaliforniaShow map of the United StatesLocationMonterey County, California, United StatesNearest cityCarmel, CaliforniaCoordinates36°18′15″N 121°53′18″W / 36.30417°N 121.88833°W / 36.30417; -121.88833Area92 acres (37 ha)Established1957Governing bodyCalifornia State ParkNaval Facility Point SurNAVFAC Point Sur logoActiveJanuary 1958 - October 1984DisbandedOperations computerized and data transmitted to NAVFA...

シンガポール国会議事堂 概要用途 議事堂所在地 シンガポール座標 北緯1度17分21秒 東経103度51分01秒 / 北緯1.2891度 東経103.8504度 / 1.2891; 103.8504座標: 北緯1度17分21秒 東経103度51分01秒 / 北緯1.2891度 東経103.8504度 / 1.2891; 103.8504着工 1995年完成 1999年所有者 シンガポール政府テンプレートを表示 国会議事堂(こっかいぎじどう、Parliament House, S...

Tàu tuần dương Noshiro trong vịnh Tokyo, tháng 7 năm 1943 Lịch sử Nhật Bản Đặt hàng 1939Xưởng đóng tàu Xưởng hải quân YokosukaĐặt lườn 4 tháng 9 năm 1941Hạ thủy 19 tháng 7 năm 1942Hoạt động 30 tháng 6 năm 1943 [1]Xóa đăng bạ 20 tháng 12 năm 1944Số phận Bị máy bay Mỹ đánh chìm ngày 26 tháng 10 năm 1944 phía Nam Mindoro trong vùng biển Sulu11°42′B 121°41′Đ / 11,7°B 121,683°Đ...

The 2010 term of the Supreme Court of the United States began October 4, 2010, and concluded October 1, 2011. This was the sixth term of Associate Justice Samuel Alito's tenure on the Court. Samuel Alito 2010 term statistics 7 Majority or Plurality 6 Concurrence 1 Other 6 Dissent 1 Concurrence/dissent Total = 21 Bench opinions = 18 Opinions relating to orders = 3 In-chambers opinions = 0 Unanimous opinions: 0 Most joined by: Roberts (12) Least joined by: Kagan (4) Type Case Citation Issues Jo...

Pegaso Z-102 Pegaso Z-102 Touring Coupé. Datos generalesFabricante PegasoDiseñador Wifredo RicartFábricas La Sagrera, BarcelonaBarajas, MadridPeríodo 1951 – 1958ConfiguraciónTipo Automóvil deportivoCarrocerías Cupé dos puertas Descapotable dos puertasConfiguración Motor V8 delantero longitudinal, tracción trasera, transmisión de 5 velocidades manualDimensionesDimensiones 4.100 mm / 1.580 mm / 1.290 mm / 2.340 mmPeso 980 kgOtros modelosSucesor Pegaso Z-103[editar datos en Wik...

Sunni Islamic university in Iran The topic of this article may not meet Wikipedia's notability guidelines for companies and organizations. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.Find sources: Jamiah Darul Uloom Zahedan – news ·...

2014 soundtrack album by John PowellHow to Train Your Dragon 2Soundtrack album by John PowellReleasedJune 13, 2014Recorded2012–2014GenreFilm scoreLength1:11:23LabelRelativity Music GroupJohn Powell chronology Rio 2(2014) How to Train Your Dragon 2(2014) Pan(2015) Singles from How to Train Your Dragon 2 Into a FantasyReleased: June 9, 2014 How to Train Your Dragon 2: Music from the Motion Picture is a soundtrack album to the 2014 film How to Train Your Dragon 2, and was released by R...

2002 film by Andrzej Sekula Cube 2 redirects here. For the video game, see Cube 2: Sauerbraten. For the digital audio player, see Cube2. 60659 redirects here. For the ZIP Code, see North Park and West Ridge, Chicago. Cube 2: HypercubeTheatrical release posterDirected byAndrzej SekułaScreenplay bySean Hood[1]Ernie Barbarash[1]Lauren McLaughlin[1]Story bySean Hood[1]Produced by Ernie Barbarash Suzanne Colvin Starring Kari Matchett Geraint Wyn Davies Grace Lynn K...

Body which defines British electoral constituencies The boundary commissions in the United Kingdom are non-departmental public bodies responsible for determining the boundaries of constituencies for elections to the House of Commons.[1] There are four boundary commissions: Boundary Commission for England Boundary Commission for Scotland Boundary Commission for Wales Boundary Commission for Northern Ireland Each commission comprises four members, three of whom take part in meetings. Th...

Flag carrier of Albania Air Albania IATA ICAO Callsign ZB ABN[1] AIR ALBANIA[1] Founded16 May 2018 (5 years ago) (2018-05-16)Commenced operationsApril 2019 (4 years ago) (2019-04)[2]HubsTirana International Airport Nënë TerezaFleet size3Destinations9HeadquartersTirana, AlbaniaKey peopleSinan Dilek (CEO)Websitewww.airalbania.com.al Air Albania is the flag carrier of Albania.[3] The airline maintains its hub and company headquar...

This article is about the story compilation by Stephen King, Dan Simmons and George R. R. Martin. For the YA trilogy by L. J. Smith, see Dark Visions Trilogy. The Skin Trade redirects here. For other uses, see Skin Trade (disambiguation). Dark Love redirects here. For the 2010 Italian movie by Antonio Capuano, see Dark Love (film). Horror fiction compilation Dark Visions First edition (under original title)AuthorStephen King,Dan Simmons,George R. R. MartinOriginal titleNight Visions 5Cov...

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Burt Reynolds filmography – news · newspapers · books · scholar · JSTOR (September 2018) (Learn how and when to remove this template message) Burt Reynolds filmography Reynolds in Dan August (1972) Filmography: Feature films 145 Television films 13 Television s...

ConkyA typical Conky appearanceOriginal author(s)Brenden MatthewsStable release1.19.6[1]  / 13 October 2023; 55 days ago (13 October 2023) Repositorygithub.com/brndnmtthws/conky Written inC, C++Operating systemLinux, FreeBSD, and OpenBSDTypeSystem monitorLicenseGPL and BSD licenses[2]Websitegithub.com/brndnmtthws/conky Conky is a free software desktop system monitor for the X Window System. It is available for Linux, FreeBSD, and OpenBSD.[3] Conky is ...

County in Ningxia, People's Republic of ChinaTongxin 同心县طْوثٍ ثِيًاTungsinCountyTongxin in WuzhongWuzhong in NingxiaCoordinates (Tongxin government): 36°57′16″N 105°53′43″E / 36.9544°N 105.8954°E / 36.9544; 105.8954CountryPeople's Republic of ChinaAutonomous regionNingxiaPrefecture-level cityWuzhongArea • Total4,433.34 km2 (1,711.72 sq mi)Population • Total318,153 • Density72/km2 (190/sq...

Geometry book Cover of the Dover edition, 1973AuthorHarold Scott MacDonald CoxeterLanguageEnglishSubjectGeometryPublished1947, 1973, 1973PublisherMethuen, Pitman, Macmillan, DoverPages321ISBN0-486-61480-8OCLC798003 Regular Polytopes is a geometry book on regular polytopes written by Harold Scott MacDonald Coxeter. It was originally published by Methuen in 1947 and by Pitman Publishing in 1948,[1][2][3][4][5][6][7][8] with a secon...

Perang Tiongkok-SikhJenderal Zorawar Singh (1786-1841)TanggalMei 1841 – Agustus 1842LokasiTibet dan LadakhHasil KebuntuanPerubahanwilayah Status quo ante bellumPihak terlibat Dinasti Qing Kemaharajaan SikhTokoh dan pemimpin Meng BaoHaipu Sher Singh, Maharaja Punjab Zorawar Singh Kahluria †Kekuatan Tidak diketahui Tidak diketahui Perang Tiongkok-Sikh Hanzi tradisional: 森巴戰爭 Hanzi sederhana: 森巴战争 Makna harfiah: Perang Dogra Alih aksara Mandarin - Hanyu Pinyin: Sēnbā Z...

English actor (1946–2016) Not to be confused with Alan Richman. Alan RickmanRickman in 2011Born(1946-02-21)21 February 1946Acton, Middlesex, EnglandDied14 January 2016(2016-01-14) (aged 69)London, EnglandAlma materRoyal Academy of Dramatic ArtOccupationsActordirectorYears active1974–2016WorksFull listPolitical partyLabourSpouse Rima Horton ​(m. 2012)​AwardsFull list Alan Sidney Patrick Rickman (21 February 1946 – 14 January 2016) was an E...