NIST logo

Publication Citation: Security Requirements for Cryptographic Modules

NIST Authors in Bold

Author(s): Annabelle Lee; Miles E. Smid; Stanley R. Snouffer;
Title: Security Requirements for Cryptographic Modules
Published: May 25, 2001
Abstract: [Includes Change Notices as of December 3, 2002] This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.
Citation: NIST FIPS - 140-2
Keywords: computer security; cryptographic module; FIPS 140-2; validation
Research Areas: Computer Security, Federal Information Processing Standards
PDF version: PDF Document Click here to retrieve PDF version of paper (1MB)