FIPS 140-3 (ISO/IEC 19790) - Testing of crypto modules and crypto algorithms
Hardware, software, firmware or hybrid-products - if there are cryptographic functions performed, getting a FIPS 140-3 certification shows compliance with a meanwhile worldwide accepted standard, originally demanded and required by public sector clients in North-America.
FIPS PUB 140-3 is the de facto standard for the testing of crypto modules. Products certified to this standard allow public authorities, as well as enterprise sector clients, of the United States and Canada to comply with requirements to use certified cryptographic products. This is driven by regulations to ensure that critical data must be cryptographically protected, and cryptographic mechanisms being used in IT products such as hardware security modules, storage media with hardware encryption, software modules, VPN solutions or smart cards are securely implemented and safe to use. The certification scope covers not only the security requirements for cryptographic algorithms, but also physical security, and entropy for random number generation.
The scheme entails 3 major programs, the cryptographic module verification program (CMVP), the "little" brother cryptographic algorithm validation program (CAVP) and entropy source validation (ESV), for more info check with https://csrc.nist.gov/publications/detail/fips/140/3/final
Which standard is it then?
FIPS 140-3 is the US version, which has an ISO/IEC pendant, which are [ISO/IEC 19790] (Requirements for Cryptographic Modules) and [ISO/IEC 24759] (Test requirements for cryptographic modules). FIPS 140-3 is basically a wrapper for [ISO/IEC 19790] and [ISO/IEC 24759]. The FIPS 140-3 consist of NIST Special Publication (SP) 800-140 and SP 800-140A to F, whereby the SP 800-140 is specifying the modifications of the Derived Test Requirements (DTR) of the test (TE) and vendor (VE) evidence requirements of the (ISO/IEC) 24759. The annexes A to F address documentation, security policy, approved security functions and others.
These documents contain instructions for the vendor on what has to be provided for testing, so called vendor evidence (“VE…”), and instructions for tester how to test e.g. the cryptographic module and its documentation tester evidence (“TE…”). It should be noted that both of these should be read by the vendor for full understanding of both VEs and TEs!
There are also FIPS 140-3 Implementation Guidance documents, which contain binding interpretations of the standard, the derived test requirements, and the referenced cryptographic standards (referenced to as IG X.Y). Relevant IGs about functional aspects have to be read and regarded by the vendor, too!
What products and security functions are tested in which program
The scheme defines 5 modules types (firmware, firmware hybrid, hardware, software, software hybrid) that can be implemented in 3 different physical security embodiments ("form-factors", single IC or smart card, multi-chip embedded module such as adapters and expansion boards or multi-chip standalone such as encrypting routers, secure radios or USB token) for products to be tested, in 4 different security levels.
The security functionality that is tested comprises of encryption, signatures, hashing, authentication, randon number generation (RNG) and key management.
The security levels are to be read and understood in ascending order, i.e. level 1 is the lowest and level 4 the most assuring security level.
SL 4 is essentially a design verification based on functional specification.
The validation or testing also considers the operational environment, which is understood as a set of all software and hardware consisting of an operating system and hardware platform required for the module to operate securely. This is important especially for software modules as by NIST definition "The type of environment in which the checklist is intended to be applied. Types of operational environments are Standalone, Managed, and Custom (including Specialized Security-Limited Functionality, Legacy, and United States Government)."?and it also impacts the efforts of testing.
Hardware and Software products are most commonly certified, whereby hardware typically is certified in higher levels. Following table shows the certifications issued by NIST as of end october 2022.
领英推荐
Ultimately the FIPS validation testing aims to test and certify that approved security functions have been deployed and are correctly implemented by the vendor.
TüV IT test laboratory is the only one in Germany (NVLAP Lab Code: 200636-0) that is approved by the National Institute of Standards and Technology (NIST, USA) for testing and validation according to FIPS PUB 140-3.
How can TüV IT assist with FIPS 140-3 certification
TüV IT as approved lab and evaluation body in the IT security domain for nearly 3 decades can assist vendors at every step towards certification:
TüViT has successfully implemented the following projects in the FIPS 140-3 environment, among others:
#firmware #hardware #software #embeddedsystems #cryptography #informationsecurity #computersecurity #certification #SecurityAnalysis ?#HardwareSecurity ?#ProductSecurity ?#SideChannel ?#SCA #FaultInjection #SecurityCertifications ?#FIPS ?#InfoSec
For more information do not hesitate to connect
IT Security Evaluation (more under info)
2 年https://www.tuvit.de/en/services/hardware-software-evaluation/fips-140-2/