FIPS Standard
module, revealing certain features and implementations of cryptographic algorithms and subsequently
revealing the values of cryptographic keys. Cryptographic modules with limited physical security
appear to be at greatest risk. Proper selection of physical security features may be used to reduce the
risk of this attack.
TEMPEST: TEMPEST attacks involve the remote or external detection and collection of the
electromagnetic signals emitted from a cryptographic module and associated equipment during
processing. Such an attack can be used to obtain keystroke information, messages displayed on a video
screen, and other forms of critical security information (e.g., cryptographic keys). Special shielding of
all components, including network cabling, is the mechanism used to reduce the risk of such an attack.
Shielding reduces and, in some cases, prevents the emission of electromagnetic signals.
If a cryptographic module is designed to mitigate one or more specific attacks, then the module’s security
policy shall specify the security mechanisms employed by the module to mitigate the attack(s). The
existence and proper functioning of the security mechanisms will be validated when requirements and
associated tests are developed.
40