Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program

Modules In Process


DISCLAIMER: The Cryptographic Module Validation Program (CMVP) FIPS 140-2 Modules In Process and Implementation Under Test (IUT) Lists are provided for information purposes only. Participation on the list is voluntary and is a joint decision by the vendor and Cryptographic Security and Testing (CST) laboratory. Modules are listed alphabetically by vendor name. Posting on the list does not imply guarantee of final FIPS 140-2 validation.

The following phases describe the FIPS 140-2 modules in process. The status of each cryptographic module in the process is identified in the list.

Cryptographic Module Validation Program FIPS 140-2 Modules In Process List

  • Review Pending
    • Complete set of testing documents submitted to NIST and CSE for review. The set includes: draft certificate, summary module description, detailed test report, nonproprietary security policy, web-site information. In addition, some CST labs include a separate physical testing report.
    • Signed letter from laboratory stating recommendation for validation received by NIST and CSE.
  • In Review
    • NIST and CSE reviewers assigned.
    • NIST and CSE perform a review of the test documents.
    • Comments coordinated by NIST and CSE reviewers and a consolidated set of comments sent to the CST laboratory.
  • Coordination (this process may be iterative)
    • Comments received by the CST laboratory from NIST and CSE for resolution.
    • Additional testing (if required).
    • Additional documentation (if required).
    • Comments resolution developed for resubmission to NIST and CSE.
    • Testing documents updated for resubmission to NIST and CSE.
    • Responses to comments and revised test documents submitted to NIST and CSE.
  • Finalization
    • Final resolution of validation review comments submitted to NIST and CSE.
    • Testing documents updated based on resolutions and submitted to NIST and CSE.
    • Certificate number assigned.
    • Certificate posting.

Cryptographic Module Validation Program FIPS 140-2 Implementation Under Test List

  • Implementation Under Test (IUT)
    • There exists a viable contract between the vendor and CST laboratory for the testing of the cryptographic module.
    • The cryptographic module is resident at the CST laboratory.
    • All of the required documentation is resident at the CST laboratory. (Note: if the vendor requires the CST lab personnel to test the cryptographic module onsite, all documents must be onsite with the module. 

If the module report was submitted to the CMVP but placed on HOLD by request from the CST Laboratory, the status is reflected as IUT.

Created October 11, 2016, Updated May 08, 2019