Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Annabelle Lee; Miles E. Smid; Stanley R. Snouffer;|
|Title:||Security Requirements for Cryptographic Modules [includes Change Notices as of 12/3/2002]|
|Published:||May 25, 2001|
|Abstract:||This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks. [Supersedes FIPS 140-1 (January 11, 1994): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917970]|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 140-2|
|Keywords:||computer security, cryptographic module, FIPS 140-2, validation|
|Research Areas:||Computer Security, Federal Information Processing Standards|
|PDF version:||Click here to retrieve PDF version of paper (1MB)|