Security Requirements for Cryptographic Modules
GPTKB entity
Statements (35)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:standard
|
| gptkbp:alsoKnownAs |
gptkb:FIPS_140
|
| gptkbp:appliesTo |
cryptographic modules
|
| gptkbp:basisFor |
cryptographic module validation program (CMVP)
|
| gptkbp:category |
gptkb:standard
cryptography information security |
| gptkbp:defines |
security requirements for cryptographic modules
security levels 1 to 4 |
| gptkbp:firstPublished |
1994
|
| gptkbp:hasVersion |
gptkb:FIPS_140-1
gptkb:FIPS_140-3 gptkb:FIPS_140-2 |
| gptkbp:mandate |
gptkb:Federal_Information_Security_Management_Act
|
| gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
| gptkbp:referencedIn |
gptkb:FIPS_140-3
gptkb:FIPS_140-2 |
| gptkbp:replacedBy |
gptkb:FIPS_140-3
gptkb:FIPS_140-2 |
| gptkbp:scope |
firmware cryptographic modules
hardware cryptographic modules hybrid cryptographic modules software cryptographic modules |
| gptkbp:specifies |
requirements for electromagnetic interference/electromagnetic compatibility (EMI/EMC)
requirements for cryptographic key management requirements for design assurance requirements for mitigation of other attacks requirements for physical security requirements for self-tests requirements for roles, services, and authentication |
| gptkbp:usedBy |
gptkb:U.S._federal_agencies
private sector organizations |
| gptkbp:bfsParent |
gptkb:FIPS_PUB_140-2
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Security Requirements for Cryptographic Modules
|