Security Requirements for Cryptographic Modules

GPTKB entity

Statements (35)
Predicate Object
gptkbp:instanceOf gptkb:standard
gptkbp:alsoKnownAs gptkb:FIPS_140
gptkbp:appliesTo cryptographic modules
gptkbp:basisFor cryptographic module validation program (CMVP)
gptkbp:category gptkb:standard
cryptography
information security
gptkbp:defines security requirements for cryptographic modules
security levels 1 to 4
gptkbp:firstPublished 1994
gptkbp:hasVersion gptkb:FIPS_140-1
gptkb:FIPS_140-3
gptkb:FIPS_140-2
https://www.w3.org/2000/01/rdf-schema#label Security Requirements for Cryptographic Modules
gptkbp:mandate gptkb:Federal_Information_Security_Management_Act
gptkbp:publishedBy gptkb:National_Institute_of_Standards_and_Technology
gptkbp:referencedIn gptkb:FIPS_140-3
gptkb:FIPS_140-2
gptkbp:replacedBy gptkb:FIPS_140-3
gptkb:FIPS_140-2
gptkbp:scope firmware cryptographic modules
hardware cryptographic modules
hybrid cryptographic modules
software cryptographic modules
gptkbp:specifies requirements for electromagnetic interference/electromagnetic compatibility (EMI/EMC)
requirements for cryptographic key management
requirements for design assurance
requirements for mitigation of other attacks
requirements for physical security
requirements for self-tests
requirements for roles, services, and authentication
gptkbp:usedBy gptkb:U.S._federal_agencies
private sector organizations
gptkbp:bfsParent gptkb:FIPS_PUB_140-2
gptkbp:bfsLayer 8