gptkbp:instanceOf
|
crypt
|
gptkbp:appliesTo
|
gptkb:U.S._federal_agencies
|
gptkbp:basedOn
|
gptkb:ISO/IEC_19790:2012
|
gptkbp:category
|
information security
|
gptkbp:countryOfOrigin
|
gptkb:United_States
|
gptkbp:documentType
|
gptkb:standard
|
gptkbp:focusesOn
|
security requirements for cryptographic modules
|
gptkbp:fullName
|
gptkb:Federal_Information_Processing_Standard_Publication_140-3
|
https://www.w3.org/2000/01/rdf-schema#label
|
FIPS 140-3
|
gptkbp:language
|
English
|
gptkbp:level
|
four security levels
|
gptkbp:publicationDate
|
March 22, 2019
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedStandard
|
gptkb:ISO/IEC_24759:2017
|
gptkbp:replacedBy
|
gptkb:FIPS_140-2
|
gptkbp:scope
|
hardware, software, firmware cryptographic modules
|
gptkbp:startDate
|
September 22, 2019
|
gptkbp:status
|
active
|
gptkbp:usedFor
|
validating cryptographic modules
|
gptkbp:website
|
https://csrc.nist.gov/publications/detail/fips/140/3/final
|
gptkbp:bfsParent
|
gptkb:HSM_(Hardware_Security_Module)
gptkb:FIPS_140-2
|
gptkbp:bfsLayer
|
6
|