Security Requirements for Cryptographic Modules
GPTKB entity
Statements (35)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:standard
|
gptkbp:alsoKnownAs |
gptkb:FIPS_140
|
gptkbp:appliesTo |
cryptographic modules
|
gptkbp:basisFor |
cryptographic module validation program (CMVP)
|
gptkbp:category |
gptkb:standard
cryptography information security |
gptkbp:defines |
security requirements for cryptographic modules
security levels 1 to 4 |
gptkbp:firstPublished |
1994
|
gptkbp:hasVersion |
gptkb:FIPS_140-1
gptkb:FIPS_140-3 gptkb:FIPS_140-2 |
https://www.w3.org/2000/01/rdf-schema#label |
Security Requirements for Cryptographic Modules
|
gptkbp:mandate |
gptkb:Federal_Information_Security_Management_Act
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:referencedIn |
gptkb:FIPS_140-3
gptkb:FIPS_140-2 |
gptkbp:replacedBy |
gptkb:FIPS_140-3
gptkb:FIPS_140-2 |
gptkbp:scope |
firmware cryptographic modules
hardware cryptographic modules hybrid cryptographic modules software cryptographic modules |
gptkbp:specifies |
requirements for electromagnetic interference/electromagnetic compatibility (EMI/EMC)
requirements for cryptographic key management requirements for design assurance requirements for mitigation of other attacks requirements for physical security requirements for self-tests requirements for roles, services, and authentication |
gptkbp:usedBy |
gptkb:U.S._federal_agencies
private sector organizations |
gptkbp:bfsParent |
gptkb:FIPS_PUB_140-2
|
gptkbp:bfsLayer |
8
|