FIPS 140

FIPS 140

The Federal Information Processing Standard 140 (FIPS) are series of publications numbered 140 which are a U.S. government computer security standards that specify requirements for cryptography modules. As of December 2006, the current version of the standard is FIPS 140-2, issued on 25 May 2001.

Purpose of FIPS 140

The National Institute of Standards and Technology (NIST) issued the 140 Publication Series to coordinate the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. FIPS 140 does not purport to provide "sufficient" conditions to guarantee that a module conforming to its requirements is secure, still less that a system built using such modules is secure. The requirements cover not only the cryptographic modules themselves but also their documentation and (at the highest security level) some aspects of the comments contained in the source code.

User agencies desiring to implement cryptographic modules should confirm that the module they are using is covered by an existing validation certificate. FIPS 140-1 and FIPS 140-2 validation certificates specify the exact module name, hardware, software, firmware, and/or applet version numbers. For Levels 2 and higher, the operating platform upon which the validation is applicable is also listed. Vendors do not always maintain their baseline validations.

The Cryptographic Module Validation Program (CMVP) is operated jointly by the United States Government's National Institute of Standards and Technology (NIST) Computer Security Division and the Communications Security Establishment (CSE) of the Government of Canada. The use of validated cryptographic modules is required by the United States Government for all unclassified uses of cryptography. The Government of Canada also recommends the use of FIPS 140 validated cryptographic modules in unclassified applications of its departments.

ecurity levels

FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application.
* FIPS 140-2 Level 1 the lowest, imposes very limited requirements; loosely, all components must be "production-grade" and various egregious kinds of insecurity must be absent.
* FIPS 140-2 Level 2 adds requirements for physical tamper-evidence and role-based authentication.
* FIPS 140-2 Level 3 adds requirements for physical tamper-resistance (making it difficult for attackers to gain access to sensitive information contained in the module) and identity-based authentication, and for a physical or logical separation between the interfaces by which "critical security parameters" enter and leave the module, and its other interfaces.
* FIPS 140-2 Level 4 makes the physical security requirements more stringent, and requires robustness against environmental attacks.

cope of requirements

FIPS 140 imposes requirements in eleven different areas:
* "Cryptographic module specification" (what must be documented)
* "Cryptographic module parts and interfaces" (what information flows in and out, and how it must be segregated)
* "Roles, services and authentication" (who can do what with the module, and how this is checked)
* "Finite state model" (documentation of the high-level states the module can be in, and how transitions occur)
* "Physical security" (tamper evidence and resistance, and robustness against extreme environmental conditions)
* "Operational environment" (what sort of operating system the module uses and is used by)
* "Cryptographic key management" (generation, entry, output, storage and destruction of keys)
* "EMI/EMC"
* "Self-tests" (what must be tested and when, and what must be done if a test fails)
* "Design assurance" (what documentation must be provided to demonstrate that the module has been well designed and implemented)
* "Mitigation of other attacks" (if a module is designed to mitigate against, say, TEMPEST attacks then its documentation must say how)

Brief history

FIPS 140-1, issued on 11 January 1994, was developed by a government and industry working group, composed of vendors and users of cryptographic equipment. The group identified the four "security levels" and eleven "requirement areas" listed above, and specified requirements for each area at each level.

FIPS 140-2, issued on 25 May 2001, takes account of changes in available technology and official standards since 1994, and of comments received from the vendor, tester, and user communities. It was the main input document to the international standard ISO/IEC 19790:2006 "Security requirements for cryptographic modules" issued on 1 March 2006.

FIPS 140-3 is a new version of the standard which is currently under development.

External links

* [http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf Full text of FIPS 140-2]
* [http://csrc.nist.gov/publications/fips/ General information about Federal Information Processing Standards; includes pointers to FIPS 140-2 and its annexes]
* [http://csrc.nist.gov/cryptval/1401labs.htm List of FIPS 140-2 Testing Labs]
* [http://wiki.mozilla.org/FIPS_Validation Opensource FIPS 140-2 Validation Project for Mozilla NSS]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • FIPS 140-2 — Saltar a navegación, búsqueda FIPS 140 2 es el acrónimo de Federal Information Processing Standard (estándares federales de procesamiento de la información), publicación 140 2, es un estándar de seguridad de ordenadores del gobierno de los… …   Wikipedia Español

  • FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… …   Wikipedia

  • федеральный стандарт (США) на обработку информации 140-1 — ФСОИ Соответствие этому стандарту является необходимым требованием, которое предъявляется к криптографическим системам защиты информации в правительственных ведомствах США и Канады. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]… …   Справочник технического переводчика

  • Adel, IA — U.S. city in Iowa Population (2000): 3435 Housing Units (2000): 1419 Land area (2000): 3.271141 sq. miles (8.472215 sq. km) Water area (2000): 0.006109 sq. miles (0.015821 sq. km) Total area (2000): 3.277250 sq. miles (8.488036 sq. km) FIPS code …   StarDict's U.S. Gazetteer Places

  • Cryptographic Module Testing Laboratory — A Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140 2 U.S. Government standard. The …   Wikipedia

  • Comparison of encrypted external drives — This is a technical feature comparison of commercial encrypted external drives. Contents 1 Background information 2 Operating systems 3 Features 4 See also …   Wikipedia

  • Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… …   Wikipedia

  • CimTrak — Developer(s) Cimcor Stable release 2.0.6.3 / July 18, 2011; 3 months ago (2011 07 18) Written in C, C++, Visual Basic, LUA …   Wikipedia

  • Crypto++ — Developer(s) Wei Dai Initial release 1995 Stable release 5.6.1 / August 9, 2010; 14 months ago ( …   Wikipedia

  • Cimcor — Cimcor, Inc. Type Private Founded 1997 Headquarters Merrillville, IN Key people Robert E. Johnson III, President CEO Products CimTrak Integrity and Compliance Suite Cimcor Cryptographic Module …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”