Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Automated Cryptographic Validation Testing

 

Background

The Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module Validation Program (CMVP) were established on July 17, 1995 by the National Institute of Standards and Technology (NIST) to validate cryptographic modules conforming to the Federal Information Processing Standards (FIPS) 140-1, Security Requirements for Cryptographic Modules, and other FIPS cryptography based standards. FIPS 140-2 was released on May 25, 2001 and supersedes FIPS 140-1.

The current implementation of the CMVP is shown in Figure 1 below. The CAVP is a prerequisite for CMVP. The CAVP and CMVP leverage NVLAP accredited Cryptographic and Security Testing (CST) laboratories for testing cryptographic algorithms with CAVP and validation testing against the Derived Test Requirements (DTR), Implementation Guidance (IG), and applicable CMVP programmatic guidance. According to existing guidance, the CST laboratories must perform 100% independent testing of the modules submitted by the vendors.


Figure 1
Figure 1 Current validation flow

The structure and the rules under which the CAVP and CMVP operate worked well for the level of the technology utilized by the Federal Government at the time when the programs were created more than two decades ago. As technology has advanced however, the algorithm and module testing processes no longer satisfy current day industry and government operational needs. Testing is exceedingly long, well beyond typical product development cycles across a wide range of technologies. The resulting validated modules do not provide useful interfaces for integration into IT systems to enable run-time monitoring of modules for compliance with FISMA.

NIST recognizes the need to improve the efficiency and effectiveness of cryptographic module testing in order to reduce the time and cost required for testing while providing a high level of assurance for Federal government consumers.

Purpose

The principal goals of this project are to collaborate with commercial or open source producers of cryptographic capabilities and government consumers of FIPS 140 validated modules in order to:

  • Improve the efficiency and effectiveness of cryptographic algorithm and module testing by adopting best practices from the industry
  • Develop test procedures and techniques that provide assurance of cryptographic algorithm correctness and module compliance to FIPS 140 in an automated manner based on machine-readable artifacts or evidence
  • Identify techniques and procedures that provide continued assurance of operational compliance to FIPS 140 for cryptographic modules throughout their lifecycle

Scope and timeline

The scope of this project is broken into multiple phases.

Phase 1

  • Identify potential approaches
  • Select the best technical approach or approaches to prototype
  • Document the technical approach
  • Target Q2, 2016

Phase 2

  • Develop working prototypes
  • Evaluate the prototypes against the principal goals
  • Target Q3, 2016.

Figure 2
Figure 2 Automated Cryptographic Validation System


Phase 3

  • Publish draft, target Q4, 2016
  • Review period, adjudication of comments, publish final version, target Q2, 2017

Phase 4

  • Integrate final version into operational CAVP and CMVP programs
  • Stand-up a prototype NIST automated algorithm testing service (acvp.nist.gov) for AES-GCM, Q3, 2016.
  • Start issuing official algorithm certificates through the automated NIST server (acvp.nist.gov) based on the ACVP protocol for selected algorithms in May 2017.
  • Roll-out a complete set of CAVP algorithm testing capabilities with automated algorithm testing with acvp.nist.gov based on the ACVP protocol in Q3, 2017.
  • Perform a pilot automated cryptographic module validation in Q2, 2017.
  • Roll-out an automated cryptographic module test NIST web service and protocol in Q4, 2018.