2011
[12-20-2011] FIPS 140-2 Annex D: Approved Key Establishment Techniques has been updated.
Annex D: Added reference to NIST SP 800-56C.
[09-26-2011] Non-Invasive Attack Testing Workshop (NIAT)
A workshop was hosted by the CMVP (NIST and CSEC) and AIST Japan to address new non-invasive attack testing methods for cryptographic modules. Presentations and papers presented at the NIAT Workshop.
[08-12-2011] FIPS 140-2 Annex B: Approved Protection Profiles has been updated.
Annex B: Added new protection profile reference.
[07-26-2011] FIPS 140-2 Annex A: Approved Security Functions, FIPS 140-2 Annex C: Approved Random Number Generators and FIPS 140-2 Annex D: Approved Key Establishment Techniques have been updated.
Annexes A, C and D: Added references to NIST SP 800-131A Transitions.
[07-15-2011] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.
New Implementation Guidance:
- 11.1 Mitigation of Other Attacks
- D.4 Requirements for Vendor Affirmation of NIST SP 800-56B
- D.5 Requirements for Vendor Affirmation of NIST SP 800-108
- D.6 Requirements for Vendor Affirmation of NIST SP 800-132
- D.7 Requirements for Vendor Affirmation of NIST SP 800-135
Updated Implementation Guidance:
- G.3 Partial Validations and Not Applicable Areas of FIPS 140-2
- Modified in regard to new IG 11.1
- G.6 Modules with both a FIPS mode and a non-FIPS mode
- Clarification that all implemented algorithms shall be referenced on the validation certificate.
- G.8 Revalidation Requirements
- Added security policy requirements for revalidation Scenarios 1 and 4
- G.13 Instructions for Validation Information Formatting
- Added examples for CVL and KTS
- 1.4 Binding of Cryptographic Algorithm Validation Certificates
- Added examples of an operational environment change
- D.1 CAVP Requirements for Vendor Affirmation of NIST SP 800-56A
- Modified the testing for primitives
- D.2 Acceptable Key Establishment Protocols
- Modified the transition text and key agreement guidance
[06-14-2011] FIPS 140-2 Annex C: Approved Random Number Generators has been updated.
Annex C: Replaced reference to ANSI X9.62-2005 – Annex D with ANSI X9.62-1998 – Annex A.4)
[03-03-2011] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.
Updated Implementation Guidance:
- G.2 Completion of a test report: Information that must be provided to NIST and CSEC
- Changes relative to the release of CRYPTIK v8.6b
- G.13 Instructions for Validation Information Formatting
- Changes relative to the release of CRYPTIK v8.6b
- A.2 Use of Non-NIST-Recommended Asymmetric Key Sizes and Elliptic Curves
- Updated for consistency with recent standards
- A.6 CAVP Requirements for Vendor Affirmation of FIPS 186-3 Digital Signature Standard
- Transition end date for FIPS 186-3 RSA is defined
- D.2 Acceptable Key Establishment Protocols
- Changed NIST CSD CT Group Contact to Mr. Tim Polk
[01-04-2011] FIPS 140-2 Annex A: Approved Security Functions and FIPS 140-2 Annex D: Approved Key Establishment Techniques have been updated.
Annex A: Moved Key Management/Establishment references to FIPS 140-2 Annex D.
Annex D: References reorganized; Added references: FIPS 186-3 – asymmetric key generation; Special Publication 800-108; Special Publication 800-132; Special Publication 800-135
[01-04-2011] Derived Test Requirements for FIPS PUB 140-2, Security Requirements for Cryptographic Modules has been updated.
Please review DTR Change Notices 6, 7 and 8