词条 | FIPS 140 |
释义 |
}} The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. {{As of|2016|December}}, the current version of the standard is FIPS 140-2, issued on 25 May 2001.[1] Purpose of FIPS 140The National Institute of Standards and Technology (NIST) issues the 140 Publication Series to coordinate the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. FIPS 140 does not purport to provide sufficient conditions to guarantee that a module conforming to its requirements is secure, still less that a system built using such modules is secure. The requirements cover not only the cryptographic modules themselves but also their documentation and (at the highest security level) some aspects of the comments contained in the source code. User agencies desiring to implement cryptographic modules should confirm that the module they are using is covered by an existing validation certificate. FIPS 140-1 and FIPS 140-2 validation certificates specify the exact module name, hardware, software, firmware, and/or applet version numbers. For Levels 2 and higher, the operating platform upon which the validation is applicable is also listed. Vendors do not always maintain their baseline validations. The Cryptographic Module Validation Program (CMVP) is operated jointly by the United States Government's National Institute of Standards and Technology (NIST) Computer Security Division and the Communications Security Establishment (CSE) of the Government of Canada. The use of validated cryptographic modules is required by the United States Government for all unclassified uses of cryptography. The Government of Canada also recommends the use of FIPS 140 validated cryptographic modules in unclassified applications of its departments. Security levelsFIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application.
In addition to the specified levels, Section 4.1.1 of the specification describes additional attacks that may require mitigation, such as differential power analysis. If a product contains countermeasures against these attacks, they must be documented and tested, but protections are not required to achieve a given level. Thus, a criticism of FIPS 140-2 is that the standard gives a false sense of security at Levels 2 and above because the standard implies that modules will be tamper-evident and/or tamper-resistant, yet modules are permitted to have side channel vulnerabilities that allow simple extraction of keys. Scope of requirementsFIPS 140 imposes requirements in eleven different areas:
Brief historyFIPS 140-1, issued on 11 January 1994, was developed by a government and industry working group, composed of vendors and users of cryptographic equipment. The group identified the four "security levels" and eleven "requirement areas" listed above, and specified requirements for each area at each level. FIPS 140-2, issued on 25 May 2001, takes account of changes in available technology and official standards since 1994, and of comments received from the vendor, tester, and user communities. It was the main input document to the international standard ISO/IEC 19790:2006 Security requirements for cryptographic modules issued on 1 March 2006. NIST issued Special Publication 800-29 outlining the significant changes from FIPS 140-1 to FIPS 140-2[2]. FIPS 140-3 is a new version of the standard which is currently under development. In the first draft version[3] of the FIPS 140-3 standard, NIST introduced a new software security section, one additional level of assurance (Level 5) and new Simple Power Analysis (SPA) and Differential Power Analysis (DPA) requirements. The draft issued on 11 Sep 2009, however, reverted to four security levels and limits the security levels of software to levels 1 and 2. CriticismDue to the way in which the validation process is set up, a software vendor is required to re-validate their FIPS-140-validated module for every change, no matter how small, to the software; this re-validation is required even for obvious bug or security fixes. Since validation is an expensive process, this gives software vendors an incentive to postpone changes to their software and can result in software that does not receive security updates until the next validation. The result may be that validated software is less safe than a non-validated equivalent.[4] See also
References1. ^{{cite web| url = https://www.nist.gov/itl/fipsinfo.cfm| title = FIPS General Information| date = 2010-10-05| publisher = NIST| accessdate = 2013-05-18}} 2. ^{{cite web| url=https://csrc.nist.gov/publications/detail/sp/800-29/final| title=A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2| date=2001-06-01| publisher=NIST| accessdate=2018-02-14}} 3. ^{{cite web| url=http://csrc.nist.gov/publications/PubsDrafts.html#FIPS-140--3| title=FIPS-140 -3: DRAFT Security Requirements for Cryptographic Modules (Revised Draft)| date=2013-03-07| publisher=NIST| accessdate=2013-05-18}} 4. ^{{cite web|url=https://blogs.oracle.com/darren/entry/fips_140_2_actively_harmful|title=Is FIPS 140-2 Actively harmful to software?|date=2014-04-16|publisher=Darren Moffat, Oracle Solaris|accessdate=2017-03-18}} External links
| url=http://csrc.nist.gov/publications/PubsFIPS.html | title=Federal Information Processing Standards (FIPS) Publications | date=2013-02-05 | publisher=NIST | accessdate=2013-05-18}}
| url=http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm | title=Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules | date=2013-05-17 | publisher=NIST | accessdate=2013-05-18}} 3 : Computer security standards|Cryptography standards|Standards of the United States |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。