National Institute of Standards and Technology


Derived Test Requirements
for FIPS PUB 140-1,
Security Requirements for Cryptographic Modules


PART 2
(Sections 5-7)

March 1995
Final

Part 1 (sections 1-4)

Part 3 (sections 8-11)

Appendix A


5. PHYSICAL SECURITY

AS05.01: Documentation shall include a complete specification of the physical embodiment and security level for which the physical security mechanisms of a cryptographic module are designed, as well as a complete description of the applicable security mechanisms that are employed by the module. (1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.02: For a single-chip cryptographic module at security level 1 or higher, the chip shall be of production quality that shall include standard passivation techniques. Single-chip; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.03: For a single-chip cryptographic module at security level 2 or higher, the chip shall be covered with an opaque, tamper-evident coating. (Single-chip; 2, 3, and 4)

(Relevant Guidance:   5.4 , 5.5  )

Required Vendor Information

Required Test Procedures


AS05.04: For a single-chip cryptographic module at security level 3 or higher, a hard, opaque tamper-evident coating shall be used. (Single-chip; 3 and 4)

 

Required Vendor Information

Required Test Procedures


AS05.05: For a single-chip cryptographic module at security level 4, a hard, opaque removal-resistant coating shall be used. (Single-chip; 4)

 

Required Vendor Information

Required Test Procedures


AS05.06: For a single-chip cryptographic module at security level 4, the module shall either include environmental failure protection (EFP) features or undergo environmental failure testing (EFT). (Single-chip; 4)

 

Required Vendor Information

Required Test Procedures


AS05.07: For a multiple-chip, embedded cryptographic module at security level 1 or higher, the chips in the module shall be of production quality that shall include standard passivation techniques. (Multiple-chip embedded; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.08: For a multiple-chip, embedded cryptographic module at security level 1 or higher, the module shall be implemented as a production-grade multiple-chip embodiment. (Multiple-chip embedded; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.09: For a multiple-chip, embedded cryptographic module at security level 2 or higher, the module shall be encapsulated with an opaque, tamper-evident material. (Multiple-chip embedded; 2, 3, and 4)

(Relevant Guidance:   5.1 , 5.2 , 5.3 , 5.4, 5.5  )

Required Vendor Information

Required Test Procedures


AS05.10: For a multiple-chip, embedded cryptographic module at security level 3 or higher, one of the following three requirements shall apply to the module: (Multiple-chip embedded; 3 or 4)

 

(Relevant Guidance:  5.6 , 5.7  )

Required Vendor Information

Required Test Procedures


AS05.11: For a multiple-chip embedded cryptographic module at security level 3 or higher, if the module has any ventilation openings, they shall be constructed to prevent undetected probing. (Multiple-chip embedded; 3 or 4)

Required Vendor Information

Required Test Procedures


AS05.12: For a multiple-chip, embedded cryptographic module at security level 4, the module shall be contained within a tamper detection envelope. (Multiple-chip embedded; 4)

(Relevant Guidance:  5.8  )

Required Vendor Information

Required Test Procedures


AS05.13: For a multiple-chip, embedded cryptographic module at security level 4, the module shall contain tamper response and zeroization circuitry. (Multiple-chip embedded; 4)

 

Required Vendor Information

Required Test Procedures


AS05.14: For a multiple-chip, embedded cryptographic module at security level 4, the module shall either include environmental failure protection (EFP) features or undergo environmental failure testing (EFT). (Multiple-chip embedded; 4)

 

Required Vendor Information

Required Test Procedures


AS05.15: For a multiple-chip, stand-alone cryptographic module at security level 1 or higher, the chips in the module shall be of production quality that shall include standard passivation techniques. (Multiple-chip stand-alone; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.16: For a multiple-chip, standalone cryptographic module at security level 1 or higher, the circuitry within the module shall be implemented as a production-grade, multiple-chip embodiment. (Multiple-chip standalone; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.17: For a multiple-chip, standalone cryptographic module, at security level 1 or higher, the module shall be contained within an enclosure that may include removable covers or doors. (Multiple-chip standalone; 1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.18: For a multiple-chip, standalone cryptographic module at security level 2 or higher, the enclosure shall be opaque. (Multiple-chip standalone; 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS05.19: For a multiple-chip, standalone cryptographic module at security level 2 or higher, if the enclosure includes any removable covers or doors, then either they shall be locked with pick-resistant mechanical locks or they shall be protected via tamper-evident seals. (Multiple-chip standalone; 2, 3, and 4)

(Relevant Guidance:   5.2 , 5.4 , 5.5  )

Required Vendor Information

Required Test Procedures


AS05.20: For a multiple-chip, standalone cryptographic module at security level 3 or higher, one of the following two requirements shall apply to the module: (Multiple-chip standalone; 3 or 4)

 

(Relevant Guidance:  5.6 , 5.7  )

Required Vendor Information

Required Test Procedures


AS05.21: For a multiple-chip, standalone cryptographic module at security level 3 or higher, if the module has any ventilation openings, they shall be constructed to prevent undetected probing. (Multiple-chip, standalone; 3 or 4)

 

Required Vendor Information

Required Test Procedures


AS05.22: For a multiple-chip standalone cryptographic module at security level 4, the module shall provide a tamper-detection envelope. (Multiple-chip standalone; 4)

(Relevant Guidance:  5.8  )

Required Vendor Information

Required Test Procedures


AS05.23: For a multiple-chip standalone, cryptographic module at security level 4, the module shall contain tamper response and zeroization circuitry. (Multiple-chip standalone; 4)

 

Required Vendor Information

Required Test Procedures


AS05.24: For a multiple-chip standalone cryptographic module at security level 4, the module shall either include environmental failure protection (EFP) features or undergo environmental failure testing (EFT) as specified in section 4.5.4 of FIPS PUB 140-1. (Multiple-chip standalone; 4)

Required Vendor Information

Required Test Procedures


6. SOFTWARE SECURITY

Note: The following software security requirements shall apply to all software and firmware contained within a cryptographic module.

 These requirements do not apply to microcode or system software whose source code is not available to the module manufacturer. These requirements do not apply to any software or firmware that can be shown not to affect the security of the module.

 


AS06.01: Documentation shall identify any software or firmware that is excluded from the software security requirements and explain the rationale for the exclusion. (1, 2, 3, and 4)

(Relevant Implementation Guidance:  1.4 , )

Required Vendor Information

Required Test Procedures


AS06.02: Documentation shall include a detailed description of the design of the software within the module (e.g., the finite state machine specification required in Section 4.4 of FIPS PUB 140-1). (1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS06.03: Documentation shall include a detailed explanation of the correspondence between the design of the software and the cryptographic module security policy (i.e., the rules of operation as documented per the requirements of Section 4.1 of FIPS PUB 140-1. (1, 2, and 3)

(Relevant Implementation Guidance:  1.5 , )
 

Required Vendor Information

Required Test Procedures


AS06.04: Documentation shall include a complete source code listing for all software contained within the module. (1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS06.05: For each software module, software function and software procedure, the source code listing shall be annotated with comments that clearly depict the relationship of these software entities to the design of the software. (1, 2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS06.06: All software within a cryptographic module shall be implemented using a high-level language, except that the limited use of low-level languages (e.g., assembly languages) is allowed when it is essential to the performance of the module or when a high-level language is not available. (3 and 4)

 

Required Vendor Information

Required Test Procedures


AS06.07: Documentation shall include a specification of a formal model (i.e., a precise mathematical statement) of the cryptographic module security policy (i.e., the security rules under which the module must operate) as documented per the requirements of Section 4.1 of FIPS PUB 140-1. The formal model shall be specified using a formal specification language that is a rigorous notation based on established mathematics, such as first order logic or set theory. (4)

 Note: Examples include, but are not limited to, INAJO, GYPSY, VDM, Z, LOTOS, EHDM, and ESTELLE.

(Relevant Implementation Guidance:  1.5 , )
 

Required Vendor Information

Required Test Procedures


AS06.08: Documentation shall include a detailed explanation (informal proof) of the correspondence between the formal model and the cryptographic module security policy. (4)

(Relevant Implementation Guidance:  1.5 , )
 

Required Vendor Information

Required Test Procedures


AS06.09: For each software module, software function and software procedure, the source code listing shall be annotated with comments that clearly specify (1) the pre-conditions required upon entry into the module, function or procedure in order for it to execute correctly, and (2) the post-conditions expected to be true when execution of the module, function or procedure is complete. (4)

 Note: These conditions may be specified using any notation that is sufficiently detailed to completely and unambiguously explain the behavior of the module, function or procedure.

 Note: While a mechanically checked proof is not required, it shall be possible to prove from the pre- and post-conditions that a module, function or procedure is consistent with the formal model.

 

Required Vendor Information

Required Test Procedures


AS06.10: Documentation shall include a detailed explanation (informal proof) of the correspondence between the software design (as reflected by the pre- and post-condition annotations) and the formal model. (4)

 

Required Vendor Information

Required Test Procedures


7. OPERATING SYSTEM SECURITY

Note: The operating system requirements in this section shall apply to a cryptographic module only if the module provides a means whereby an operator can load and execute software or firmware that was not included as part of the validation of the module.

 An example of a cryptographic module for which the operating system requirements apply is a cryptographic module which is a general purpose computer running cryptographic software as well as untrusted user-supplied software (e.g., a spreadsheet or word processing program). In this case, the hardware, operating system and cryptographic software are considered part of the cryptographic module, and hence, the operating system requirements apply.

 


AS07.01: All cryptographic software shall be installed only as executable code in order to discourage scrutiny and modification by users. (1, 2, 3, and 4)

 

Required Test Procedures


AS07.02: A cryptographic mechanism using a FIPS approved authentication technique (e.g., the computation and verification of a data authentication code or NIST digital signature algorithm) shall be applied to the cryptographic software within the cryptographic module. This cryptographic mechanism requirement may be incorporated as part of Software/Firmware test if a FIPS approved authentication technique is employed for that test. (1, 2, 3, and 4)

(Relevant Guidance:  7.1 , )

Required Vendor Information

Required Test Procedures


AS07.03: Use of the cryptographic module shall be limited to a single user at a time. (1)

 Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by the cryptographic module itself.

 

Required Vendor Information

Required Test Procedures


AS07.04: Use of the cryptographic module shall be dedicated to the cryptographic process during the time the cryptographic process is in use. (1)

 Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by the cryptographic module itself.

 

Required Vendor Information

Required Test Procedures


AS07.05: All cryptographic software, cryptographic keys and other critical security parameters, and control and status information shall be under the control of an operating system that provides controlled access protection (i.e., C2 protection in accordance with the Trusted Computer System Evaluation Criteria (TCSEC) or FIPS approved equivalent). Only operating systems that have been evaluated by a NIST accredited evaluation authority and against a FIPS approved criteria shall be used. (2)

 Note: The discretionary access control mechanisms provided by a C2 or equivalent operating system shall be employed to protect all plaintext data, cryptographic software, cryptographic keys, authentication data, and other critical security parameters from unauthorized access, per the following requirements:

(Relevant Guidance:  7.2 , )

Required Vendor Information

Required Test Procedures


AS07.06: The operating system shall provide the capability to specify a set of operators who can execute cryptographic program images contained on the cryptographic module's secondary storage. (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.07: The operating system shall provide the capability to specify a separate set of operators for each of the following cryptographic module software components, such that only elements within that component's set can modify (i.e., write, replace, delete) entities within that component: (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.08: The operating system shall provide the capability to prevent all operators and executing processes from modifying executing cryptographic processes (i.e., loaded and executing cryptographic program images). Executing processes, in this case, means all non-operating system (i.e., all operator initiated) processes, cryptographic or not. (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.09: The operating system shall provide the capability to specify a separate set of operators and cryptographic processes for each of the following cryptographic module software components, such that only elements within a given component's set can read entities within that component: (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.10: The operating system shall provide the capability to prevent all operators and processes from reading the following cryptographic module software components: (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.11: The operating system shall provide the capability to specify a set of operators who are authorized to enter cryptographic keys and other critical security parameters. (2, 3, and 4)

 

Required Vendor Information

Required Test Procedures


AS07.12: All cryptographic software, cryptographic keys and other critical security parameters, control and status information shall be labelled and under the control of an operating system that provides labelled protection (i.e., B1 protection in accordance with the Trusted Computer System Evaluation Criteria (TCSEC) or FIPS approved equivalent). Only operating systems that have been evaluated by a NIST accredited evaluation authority and against a FIPS approved criteria shall be used. (3)

 

Required Vendor Information

Required Test Procedures


AS07.13: All cryptographic keys, authentication data, other critical security parameters, control inputs and status outputs shall be communicated only via a trusted mechanism (e.g., a dedicated I/O port or a trusted path). (3 and 4)

 

Required Vendor Information

Required Test Procedures


AS07.14: When a trusted path is used, the trusted computing base (TCB) of the operating system shall support the trusted path between itself and the operators for use when a positive TCB-to-operator connection is required. (3 and 4)

 

Required Test Procedures


AS07.15: When a trusted path is used, communications via this trusted path shall be activated exclusively by an operator or the TCB and shall be logically isolated and unmistakably distinguishable from other paths. (3 and 4)

 

Required Test Procedures


AS07.16: The operating system shall provide the capability to audit the entry of cryptographic keys, other critical security parameters and control inputs and status outputs. (3 and 4)

 Note: An assumption of this assertion is that the cryptographic module must use the audit mechanism provided by the operating system to audit the identified events. It is not sufficient for the cryptographic module software to use another file, no matter how well protected, as its audit log.

 Note: It is also assumed that the assertion requires that each of the events identified in the assertion be auditable by the cryptographic module software. The cryptographic module software may have the capability for turning off auditing of one or all of the identified events, but they must all be potentially auditable. This assertion sets no requirement on which events must be audited by a given site.

 Note: The operating system must have the capability to allow non-TCB processes to use (write to) the system audit log. This capability is not inherent (guaranteed) in a B1 system, or in a system evaluated at any class.

 

Required Vendor Information

Required Test Procedures


AS07.17: All cryptographic software, cryptographic keys and other critical security parameters, control and status information shall be labelled and under the control of an operating system that provides structured protection (i.e., B2 protection in accordance with the Trusted Computer System Evaluation Criteria (TCSEC), or FIPS approved equivalent). Only operating systems that have been evaluated by a NIST accredited evaluation authority and against a FIPS approved criteria shall be used. (4)

 

Required Vendor Information

Required Test Procedures


1 This definition has been derived from the definition of "Formal Security Policy Model," Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Center, DOD 5200.28-STD, December 1985.

 2 [NCSC-TG-10]: A Guide to Understanding Security Modeling in Trusted Systems, National Computer Security Center, October 1992.

 


Continue to sections 8-11 of the DTR (part 3 of 3)...


Need assistance?

Last Update: January 10, 2002
Computer Security Division
National Institute of Standards and Technology