FIPS Standard

TABLE OF CONTENTS
1. OVERVIEW........................................................................................................................................... 1
1.1 Security Level 1.............................................................................................................................. 1
1.2 Security Level 2.............................................................................................................................. 2
1.3 Security Level 3.............................................................................................................................. 2
1.4 Security Level 4.............................................................................................................................. 3
2. GLOSSARY OF TERMS AND ACRONYMS...................................................................................... 4
2.1 Glossary of Terms .......................................................................................................................... 4
2.2 Acronyms ....................................................................................................................................... 8
3. FUNCTIONAL SECURITY OBJECTIVES........................................................................................ 11
4. SECURITY REQUIREMENTS...........................................................................................................12
4.1 Cryptographic Module Specification............................................................................................ 13
4.2 Cryptographic Module Ports and Interfaces ................................................................................. 14
4.3 Roles, Services, and Authentication.............................................................................................15
4.3.1 Roles..................................................................................................................................... 16
4.3.2 Services................................................................................................................................. 16
4.3.3 Operator Authentication ....................................................................................................... 17
4.4 Finite State Model ........................................................................................................................ 19
4.5 Physical Security .......................................................................................................................... 20
4.5.1 General Physical Security Requirements.............................................................................. 21
4.5.2 Single-Chip Cryptographic Modules.................................................................................... 23
4.5.3 Multiple-Chip Embedded Cryptographic Modules............................................................... 24
4.5.4 Multiple-Chip Standalone Cryptographic Modules.............................................................. 25
4.5.5 Environmental Failure Protection/Testing............................................................................ 26
4.6 Operational Environment ............................................................................................................. 27
4.6.1 Operating System Requirements .......................................................................................... 28
4.7 Cryptographic Key Management.................................................................................................. 30
4.7.1 Random Number Generators (RNGs)................................................................................... 30
4.7.2 Key Generation..................................................................................................................... 31
4.7.3 Key Establishment................................................................................................................ 31
4.7.4 Key Entry and Output........................................................................................................... 31
4.7.5 Key Storage .......................................................................................................................... 33
4.7.6 Key Zeroization.................................................................................................................... 33
4.8 Electromagnetic Interference/Electromagnetic Compatibility (EMI/EMC)................................. 33
4.9 Self-Tests...................................................................................................................................... 33
4.9.1 Power-Up Tests .................................................................................................................... 34
4.9.2 Conditional Tests.................................................................................................................. 35
4.10 Design Assurance......................................................................................................................... 36
4.10.1 Configuration Management.................................................................................................. 36
4.10.2 Delivery and Operation......................................................................................................... 37
4.10.3 Development......................................................................................................................... 37
4.10.4 Guidance Documents............................................................................................................ 38
4. 11 Mitigation of Other Attacks............................................................................................................. 39
APPENDIX A: SUMMARY OF DOCUMENTATION REQUIREMENTS .............................................. 41
APPENDIX B: RECOMMENDED SOFTWARE DEVELOPMENT PRACTICES .................................. 45
APPENDIX C: CRYPTOGRAPHIC MODULE SECURITY POLICY...................................................... 47
APPENDIX D: SELECTED BIBLIOGRAPHY.......................................................................................... 51
vii