Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

2014-2013 Announcements Archive

2014

[10-08-2014] Annex A for FIPS PUB 140-2 and FIPS 140-2 Annex D: Approved Key Establishment Techniques have been updated.

Annex A: Added references to NIST SP 800-38F and NIST SP 800-52, Rev 1

Annex D: Updated reference to NIST SP 800-56B, Rev 1


[04-25-2014] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

Updated Implementation Guidance:

  • 9.10 Power-Up Tests for Software Module Libraries
    • Editorial changes for additional clarity.

[02-26-2014] FIPS 140-2 Annex D: Approved Key Establishment Techniques has been updated.

Annex D: Added reference to NIST SP 800-133


[02-24-2014] FIPS 140-2 Annex D: Approved Key Establishment Techniques has been updated.

Annex D: Replaced reference to FIPS 186-3 with FIPS 186-4 and SP 800-56a Revision 1 to Revision 2.


[01-31-2014] FIPS 140-2 Annex A: Approved Security Functions has been updated.

Annex A: Replaced reference to FIPS 186-3 with FIPS 186-4.


[01-17-2014] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

Updated Implementation Guidance:

  • G.15 Validating the Transition from FIPS 186-2 to FIPS 186-4
    • Editorial change
  • 7.13 Cryptographic Key Strength Modified by an Entropy Estimate –
    • Changed the minimum entropy requirement based on SP 800-131A transition effective 01-01-2014.

[01-15-2014] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

Updated Implementation Guidance:

  • G.13 Instructions for Validation Information Formatting
    • Removed incorrect examples based on SP 800-131A transition effective 01-01-2014.

[01-08-2014] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

Updated Implementation Guidance:

  • G.13 Instructions for Validation Information Formatting

Updated examples based on SP 800-131A transition effective 01-01-2014.

2013

[07-25-2013] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

New Implementation Guidance:

  • 3.5 Documentation Requirements for Cryptographic Module Services
  • 9.9 Pair-Wise Consistency Self-Test When Generating a Key Pair
  • 9.10 Power-Up Tests for Software Module Libraries
  • D.11 References to the Support of Industry Protocols

Updated Implementation Guidance:

  • D.8 Key Agreement Methods
    • Resolution section has been updated.
  • D.9 Key Transport Methods
    • Resolution section has been updated.

[06-07-2013] Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated.

Updated Implementation Guidance:

  • G.8 Revalidation Requirements
    • Added Alternative Scenarios 1A and 1B.

[01-02-2013] FIPS 140-2 Annex D: Approved Key Establishment Techniques has been updated.

Annex D: Added reference to NIST SP 800-38F.

 

Created October 11, 2016, Updated June 29, 2020