discovered, explained
FIPS 140-3 creates the conditions for uniform security standards for cryptographic modules and thus enables international comparability. The standard addresses current threats as well as modern cryptography and security technologies and thus provides a contemporary basis.
FIPS (Federal Information Processing Standard) 140-3 is a standard developed by the US National Institute of Standards and Technology (NIST) that defines the basic requirements for cryptographic products.
It is binding for all US federal organisations and authorities that use cryptography-based security systems to protect sensitive data. The standard should therefore be used as the basis for the development and implementation of cryptographic modules.
FIPS 140-3 has become a worldwide de facto standard and is used in various industries, such as the financial sector or healthcare. The standard contains 4 qualitatively increasing security levels that cover a wide range of possible applications and environments.
The CMVP offers certification through validation tests of the functional requirements and manufacturer documentation, source code examinations & tests and - depending on the module type and the desired security level - physical tests.
Five different module types can be certified under the programme:
CAVP includes validation tests for approved (i.e. FIPS-approved and NIST-recommended) cryptographic algorithms and their individual components. CAVP can only be used for testing algorithms, but is mandatory and the first step of a cryptographic module validation according to CMVP.
Entropy source validation is a new area within the Cryptographic Module Validation Programme provided by NIST. The test is required if a module has its own entropy source.
Corresponding validation tests may only be carried out by NIST/NVLAP-accredited test laboratories - such as TÜVIT.
Depending on the security level (and the associated tests), module validation within the framework of CMVP usually takes 4-8 months before the report can be submitted to CMVP.
With the Cryptographic Module Validation Program (CMVP), the Cryptographic Algorithm Validation Program (CAVP) and the Entropy Source Validation (ESV), NIST offers three different certification programmes in connection with FIPS 140-3.
Cryptographic Module Validation Programme (CMVP)
The CMVP offers certification through validation tests of the functional requirements and manufacturer documentation, source code examinations & tests and - depending on the module type and the desired security level - physical tests.
Five different module types can be certified as part of the programme: Hardware Modules, Software Modules, Firmware Modules, Hybrid Software Modules and Hybrid Firmware Modules.
Cryptographic Algorithm Validation Programme (CAVP)
CAVP includes validation tests for approved (i.e. FIPS-approved and NIST-recommended) cryptographic algorithms and their individual components. CAVP can only be used for testing algorithms, but is mandatory and the first step of a cryptographic module validation according to CMVP.
Entropy Source Validation (ESV)
Entropy source validation is a new area within the Cryptographic Module Validation Programme provided by NIST. The validation is required if a module has its own entropy source.
Corresponding validation tests may only be carried out by NIST/NVLAP-accredited test laboratories - such as TÜVIT.
The FIPS 140-3 standard defines 5 different module types that can be certified as part of the CMVP programme: Hardware, software, firmware, hybrid software or hybrid firmware modules.
An Implementation Guidance contains binding interpretations of the standard, the derived test requirements and the referenced cryptographic standards and must be taken into account by the provider.
The OU is the entirety of software and hardware, including an operating system, which is required for the safe operation of the module.
Physical security components are physical representations of cryptographic modules. They can be used as a single chip (a single integrated circuit) as a standalone device or embedded in a housing or product that may not be physically protected. Examples include single IC chips or smart cards with a single IC chip.
Embedded multi-chip cryptographic modules are physical components where two or more IC chips are interconnected and embedded in a housing or product that may not be physically protected. Examples include adapters and expansion cards.
Standalone multi-chip cryptographic modules are physical components where two or more IC chips are interconnected and the entire package is physically protected. Examples include encrypted routers, secure wireless devices or USB tokens.