throbber
ARCHIVED PUBLICATION
`
`
`
`The attached publication,
`
`FIPS Publication 140-1
`(dated January 11, 1994),
`
`has been superseded and is provided here only for
`historical purposes.
`
`
`
`For the most current revision of this publication, see:
`http://csrc.nist.gov/publications/PubsFIPS.html#140-2.
`
`
`
`
`
`
`
`IBM-1015
`Page 1 of 56
`
`

`
`FIPS PUB 140-1
`
`FEDERAL INFORMATION
`PROCESSING STANDARDS PUBLICATION
`
`1994 January 11
`
`U.S. DEPARTMENT OF COMMERCE / National Institute of Standards and Technology
`
`SECURITY REQUIREMENTS
`FOR
`CRYPTOGRAPHIC MODULES
`
` CATEGORY: COMPUTER SECURITY
` SUBCATEGORY: CRYPTOGRAPHY
`
`IBM-1015
`Page 2 of 56
`
`

`
`U.S. DEPARTMENT OF COMMERCE, Ronald H. Brown, Secretary
`NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY,
`
`Foreword
`
`The Federal Information Processing Standards Publication Series of the National Institute of
`Standards and Technology (NIST) is the official series of publications relating to standards and guidelines
`adopted and promulgated under the provisions of Section 111(d) of the Federal Property and
`Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-
`235. These mandates have given the Secretary of Commerce and NIST important responsibilities for
`improving the utilization and management of computer and related telecommunications systems in the
`Federal Government. The NIST, through its Computer Systems Laboratory, provides leadership, technical
`guidance, and coordination of Government efforts in the development of standards and guidelines in these
`areas.
`
`Comments concerning Federal Information Processing Standards Publications are welcomed and
`should be addressed to the Director, Computer Systems Laboratory, National Institute of Standards and
`Technology, Gaithersburg, MD 20899.
`
`James H. Burrows, Director
`Computer Systems Laboratory
`
`Abstract
`
`The selective application of technological and related procedural safeguards is an important
`responsibility of every Federal organization in providing adequate security in its computer and
`telecommunication systems. This publication provides a standard to be used by Federal organizations
`when these organizations specify that cryptographic-based security systems are to be used to provide
`protection for sensitive or valuable data. Protection of a cryptographic module within a security system
`is necessary to maintain the confidentiality and integrity of the information protected by the module. This
`standard specifies the security requirements that are to be satisfied by a cryptographic module. The
`standard provides four increasing, qualitative levels of security intended to cover a wide range of potential
`applications and environments. The security requirements cover areas related to the secure design and
`implementation of a cryptographic module. These areas include basic design and documentation, module
`interfaces, authorized roles and services, physical security, software security, operating system security,
`key management, cryptographic algorithms, electromagnetic interference/electromagnetic compatibility
`(EMI/EMC), and self-testing.
`
`Key words: computer security, telecommunication security, cryptography, cryptographic modules, Federal
`Information Processing Standard (FIPS).
`
`IBM-1015
`Page 3 of 56
`
`

`
`FIPS PUB 140-1
`
`Federal Information
`Processing Standards Publication 140-1
`
`1994 January 11
`
`Announcing the Standard for
`
`SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
`
`Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and
`Technology (NIST) after approval by the Secretary of Commerce pursuant to Section 111(d) of the Federal Property and
`Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235.
`
`1.
`
`2.
`
`Name of Standard. Security Requirements for Cryptographic Modules (FIPS PUB 140-1).
`
`Category of Standard. Computer Security Standard, Cryptography
`
`Explanation. This standard specifies the security requirements that are to be satisfied by a
`3.
`cryptographic module utilized within a security system protecting unclassified information within
`computer and telecommunication systems (including voice systems). The standard provides four
`increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are
`intended to cover the wide range of potential applications and environments in which cryptographic
`modules may be employed. The security requirements cover areas related to the secure design and
`implementation of a cryptographic module. These areas include basic design and documentation, module
`interfaces, authorized roles and services, physical security, software security, operating system security,
`key management, cryptographic algorithms, electromagnetic interference/electromagnetic compatibility
`(EMI/EMC), and self-testing. This standard supersedes FIPS 140, General Security Requirements for
`Equipment Using the Data Encryption Standard, in its entirety.
`
`4.
`
`Approving Authority. Secretary of Commerce.
`
`Maintenance Agency. Department of Commerce, National Institute of Standards and
`5.
`Technology, (Computer Systems Laboratory).
`
`6.
`
`Cross Index.
`
`a.
`b.
`
`c.
`
`d.
`
`FIPS PUB 46-2, Data Encryption Standard.
`FIPS PUB 48, Guidelines on Evaluation of Techniques for Automated Personal
`Identification.
`FIPS PUB 74, Guidelines for Implementing and Using the NBS Data Encryption
`Standard.
`FIPS PUB 81, DES Modes of Operation.
`
`1
`
`IBM-1015
`Page 4 of 56
`
`

`
`FIPS PUB 140-1
`
`e.
`
`f.
`g.
`h.
`i.
`j.
`
`k.
`l.
`
`FIPS PUB 83, Guideline of User Authentication Techniques for Computer Network
`Access Control.
`FIPS PUB 112, Password Usage.
`FIPS PUB 113, Computer Data Authentication.
`FIPS PUB 171, Key Management Using ANSI X9.17.
`FIPS PUB 180, Secure Hash Standard.
`Special Publication 500-157, Smart Card Technology: New Methods for Computer
`Access Control.
`Special Publication 800-2, Public Key Cryptography.
`Federal Information Resources Management Regulations (FIRMR) subpart 201.20.303,
`Standards, and subpart 201.39.1002, Federal Standards.
`
`Other NIST publications may be applicable to the implementation and use of this standard. A list (NIST
`Publications List 91) of currently available computer security publications, including ordering
`information, can be obtained from NIST.
`
`Applicability. This standard is applicable to all Federal agencies that use cryptographic-based
`7.
`security systems to protect unclassified information within computer and telecommunication systems
`(including voice systems) that are not subject to Section 2315 of Title 10, U.S. Code, or Section 3502(2)
`of Title 44, U.S. Code. This standard shall be used in designing, acquiring and implementing
`cryptographic-based security systems within computer and telecommunication systems (including voice
`systems), operated by a Federal agency or by a contractor of a Federal agency or other organization that
`processes information (using a computer or telecommunications system) on behalf of the Federal
`Government to accomplish a Federal function. Federal agencies which use cryptographic-based security
`systems for protecting classified information may use those systems for protecting unclassified
`information in lieu of systems that comply with this standard. Non-Federal government organizations
`are encouraged to adopt and use this standard when it provides the desired security for protecting
`valuable or sensitive information.
`
`Applications. Cryptographic-based security systems may be utilized in various computer and
`8.
`telecommunication (including voice) applications (e.g., data storage, access control and personal
`identification, radio, facsimile, video) and in various environments (e.g., centralized computer facilities,
`office environments, hostile environments). The cryptographic services (e.g., encryption, authentication,
`digital signature, key management) provided by a cryptographic module will be based on many factors
`which are specific to the application and environment. The security level of a cryptographic module
`shall be chosen to provide a level of security appropriate for the security requirements of the application
`and environment in which the module is to be utilized and the security services which the module is to
`provide. The security requirements for a particular security level include both the security requirements
`specific to that level and the security requirements that apply to all modules regardless of the level.
`System characteristics not related to security (e.g., telecommunications interoperability) are beyond the
`scope of this standard.
`
`Specifications. Federal Information Processing Standard (FIPS) 140-1, Security Requirements
`9.
`for Cryptographic Modules (affixed).
`
`2
`
`IBM-1015
`Page 5 of 56
`
`

`
`FIPS PUB 140-1
`
`Implementations. This standard covers implementations of cryptographic modules including,
`10.
`but not limited to, hardware components or modules, software programs or modules, computer firmware,
`or any combination thereof. Cryptographic modules that are validated by NIST, or that comply with the
`requirements of the FIPS 140-1 implementation and FIPS 140 acquisition schedules in Section 14 of the
`announcement of this standard, will be considered as complying with this standard. Information about
`the FIPS 140-1 validation program can be obtained from the National Institute of Standards and
`Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.
`
`FIPS Approved Security Methods. Cryptographic modules that comply with this standard shall
`11.
`employ cryptographic algorithms, cryptographic key generation algorithms and key distribution
`techniques, and authentication techniques that have been FIPS approved for protecting Federal
`Government unclassified information. FIPS approved cryptographic algorithms, cryptographic key
`generation algorithms and key distribution techniques, and authentication techniques include those that
`are either:
`
`a.
`
`b.
`
`specified in a Federal Information Processing Standard (FIPS), or
`
`adopted in a FIPS and specified either in an appendix to the FIPS or in a document
`referenced by the FIPS.
`
`If a cryptographic module is required to incorporate a trusted operating system, then the module shall
`employ trusted operating systems that have been evaluated by a NIST accredited evaluation authority
`and against a FIPS approved evaluation criteria.
`
`Information about approved cryptographic methods and approved operating system evaluation authorities
`and criteria can be obtained from NIST.
`
`Interpretation. Resolution of questions regarding this standard will be provided by NIST.
`12.
`Questions concerning the content and specifications should be addressed to: Director, Computer Systems
`Laboratory, ATTN: FIPS 140-1 Interpretation, National Institute of Standards and Technology,
`Gaithersburg, MD 20899.
`
`Export Control. Certain cryptographic devices and technical data regarding them are deemed
`13.
`to be defense articles (i.e., inherently military in character) and are subject to Federal government export
`controls as specified in Title 22, Code of Federal Regulations, Parts 120-128. Some exports of
`cryptographic modules conforming to this standard and technical data regarding them must comply with
`these Federal regulations and be licensed by the U.S. Department of State. Other exports of
`cryptographic modules conforming to this standard and technical data regarding them fall under the
`licensing authority of the Bureau of Export Administration of the U.S. Department of Commerce. The
`Department of Commerce is responsible for licensing cryptographic devices used for authentication,
`access control, proprietary software, automatic teller machines (ATMs), and certain devices used in other
`equipment and software. For advice concerning which agency has licensing authority for a particular
`cryptographic device, please contact the respective agencies.
`
`3
`
`IBM-1015
`Page 6 of 56
`
`

`
`FIPS PUB 140-1
`
`Implementation Schedule. Table 1 summarizes the implementation schedule for FIPS 140-1.
`14.
`The effective date of this standard is June 30, 1994.
`
`From approval of FIPS 140-1 to its effective date, agencies may purchase equipment with FIPS 140-1
`cryptographic modules that have been affirmed in writing from the manufacturer as complying with this
`standard. From June 30, 1994 until six months after the establishment of the FIPS 140-1 validation
`program by NIST, agencies that have determined a need for equipment with cryptographic modules shall
`purchase equipment with FIPS 140-1 cryptographic modules that have been affirmed in writing by the
`manufacturer as complying with this standard. A copy of the written affirmation shall have been sent
`to the Director, Computer Systems Laboratory, National Institute of Standards and Technology,
`Gaithersburg, MD 20899.
`
`Table 1: FIPS 140-1 Implementation Schedule
`
`4
`
`IBM-1015
`Page 7 of 56
`
`

`
`FIPS PUB 140-1
`
`For a one year period following the six months after the establishment of the FIPS 140-1 validation
`program, agencies shall purchase either equipment with validated FIPS 140-1 cryptographic modules,
`or equipment whose cryptographic modules have been submitted for FIPS 140-1 validation. After this
`period, only FIPS 140-1 validated cryptographic modules will be considered as meeting the provisions
`of this standard.
`
`Table 2 summarizes the schedule for acquisition of FIPS 140 compliant equipment. For up to three
`years following June 30, 1994, equipment with cryptographic modules complying to FIPS 140, General
`Security Requirements for Equipment Using the Data Encryption Standard (formerly Federal Standard
`1027), may be purchased in lieu of equipment with modules that comply with this standard. These
`modules either shall have been endorsed by the National Security Agency (NSA) as complying to
`Federal Standard 1027, or shall be affirmed in writing by the manufacturer as complying to FIPS 140.
`NSA endorsed modules shall have been endorsed prior to January 11, 1994. A list of endorsed products
`(NSA Endorsed Data Encryption Standard (DES) Products List) is available from the NSA. For modules
`affirmed by the manufacturer as complying with FIPS 140, a copy of the written affirmation shall have
`been sent by the manufacturer to the Director of the Computer Systems Laboratory at NIST prior to June
`30, 1994. A list of these modules is available from NIST.
`
`Equipment purchased under the above conditions may continue to be used for the lifetime of the
`equipment without the need for further affirmation or validation for conformance to this standard.
`
`Table 2: FIPS 140 Schedule for Acquisition of Validated Products
`
`5
`
`IBM-1015
`Page 8 of 56
`
`

`
`FIPS PUB 140-1
`
`Qualifications. The security requirements specified in this standard are based upon information
`15.
`provided by many sources within the Federal government and private industry. The requirements are
`designed to protect against adversaries mounting cost-effective attacks on unclassified government or
`commercial data (e.g., hackers, organized crime, economic competitors). The primary goal in designing
`an effective security system is to make the cost of any attack greater than the possible payoff.
`
`While the security requirements specified in this standard are intended to maintain the security of a
`cryptographic module, conformance to this standard does not guarantee that a particular module is
`secure. It is the responsibility of the manufacturer of a cryptographic module to build the module in a
`secure manner.
`
`Similarly, the use of a cryptographic module that conforms to this standard in an overall system does
`not guarantee the security of the overall system. The responsible authority in each agency shall assure
`that an overall system provides an acceptable level of security.
`
`Since a standard of this nature must be flexible enough to adapt to advancements and innovations in
`science and technology, this standard will be reviewed every 5 years in order to consider new or revised
`requirements that may be needed to meet technological and economic changes.
`
`16. Waiver Procedure. Under certain exceptional circumstances, the heads of Federal agencies may
`approve waivers to Federal Information Processing Standards (FIPS). The head of such agency may
`redelegate such authority only to a senior official designated pursuant to Section 3506(b) of Title 44,
`U.S. Code. Waivers shall be granted only when:
`
`a.
`
`b.
`
`Compliance with a standard would adversely affect the accomplishment of the mission
`of an operator of a Federal computer system, or
`
`cause a major adverse financial impact on the operator which is not offset by
`Government-wide savings.
`
`Agency heads may act upon a written waiver request containing the information detailed above. Agency
`heads may also act without a written waiver request when they determine that conditions for meeting
`the standard cannot be met. Agency heads may approve waivers only by a written decision which
`explains the basis on which the agency head made the required finding(s). A copy of each such
`decision, with procurement sensitive or classified portions clearly identified, shall be sent to: National
`Institute of Standards and Technology; ATTN: FIPS Waiver Decisions, Technology Building, Room B-
`154; Gaithersburg, MD 20899.
`
`In addition, notice of each waiver granted and each delegation of authority to approve waivers shall be
`sent promptly to the Committee on Government Operations of the House of Representatives and the
`Committee on Government Affairs of the Senate and shall be published promptly in the Federal Register.
`
`When the determination on a waiver applies to the procurement of equipment and/or services, a notice
`of the waiver determination must be published in the Commerce Business Daily as a part of the notice
`
`6
`
`IBM-1015
`Page 9 of 56
`
`

`
`FIPS PUB 140-1
`
`of solicitation for offers of an acquisition or, if the waiver determination is made after that notice is
`published, by amendment to such notice.
`
`A copy of the waiver, any supporting documents, the document approving the waiver and any supporting
`and accompanying documents, with such deletions as the agency is authorized and decides to make
`under Section 552(b) of Title 5, U.S. Code, shall be part of the procurement documentation and retained
`by the agency.
`
`17. Where to obtain copies. Copies of this publication are available for sale by the National
`Technical Information Service, U.S. Department of Commerce, Springfield, VA 22161. When ordering,
`refer to Federal Information Processing Standards Publication 140-1 (FIPS PUB 140-1), and title. When
`microfiche is desired, this should be specified. Payment may be made by check, money order, credit
`card, or deposit account.
`
`7
`
`IBM-1015
`Page 10 of 56
`
`

`
`1
`
`2
`
`3
`
`4
`
`FIPS PUB 140-1
`
`Federal Information
`Processing Standards Publication 140-1
`
`January 11, 1994
`
`Specifications for the
`
`SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
`
`OVERVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
`1.1
`Security Level 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
`1.2
`Security Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
`1.3
`Security Level 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
`1.4
`Security Level 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
`
`DEFINITIONS AND ACRONYMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
`2.1
`Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
`2.2
`Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
`
`FUNCTIONAL SECURITY OBJECTIVES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
`
`4.4
`4.5
`
`SECURITY REQUIREMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
`4.1
`Cryptographic Modules
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
`4.2
`Module Interfaces
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
`4.3
`Roles and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
`4.3.1 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
`4.3.2
`Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
`4.3.3 Operator Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
`Finite State Machine Model
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
`Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
`4.5.1
`Single-Chip Cryptographic Modules . . . . . . . . . . . . . . . . . . . . . . . . . . 29
`4.5.2 Multiple-Chip Embedded Cryptographic Modules . . . . . . . . . . . . . . . . . 30
`4.5.3 Multiple-Chip Standalone Cryptographic Modules
`. . . . . . . . . . . . . . . . 32
`4.5.4 Environmental Failure Protection/Testing . . . . . . . . . . . . . . . . . . . . . . . 34
`4.5.4.1 Environmental Failure Protection Features
`. . . . . . . . . . . . . . . . 34
`4.5.4.2 Environmental Failure Testing Procedures
`. . . . . . . . . . . . . . . . 35
`Software Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
`Operating System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
`Cryptographic Key Management
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
`4.8.1 Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
`4.8.2 Key Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
`4.8.3 Key Entry and Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
`4.8.4 Key Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
`
`4.6
`4.7
`4.8
`
`8
`
`IBM-1015
`Page 11 of 56
`
`

`
`FIPS PUB 140-1
`
`4.9
`4.10
`4.11
`
`4.8.5 Key Destruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
`4.8.6 Key Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
`Cryptographic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
`Electromagnetic Interference/Electromagnetic Compatibility (EMI/EMC) . . . . . . 42
`Self-Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
`4.11.1 Power-Up Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
`4.11.2 Conditional Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
`
`APPENDIX A: SUMMARY OF DOCUMENTATION REQUIREMENTS . . . . . . . . . . . . . . . 47
`
`APPENDIX B: RECOMMENDED SOFTWARE DEVELOPMENT PRACTICES . . . . . . . . . . 50
`
`APPENDIX C: SELECTED REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
`
`9
`
`IBM-1015
`Page 12 of 56
`
`

`
`FIPS PUB 140-1
`
`1
`
`OVERVIEW
`
`This standard specifies the security requirements that are to be satisfied by a cryptographic module
`utilized within a security system protecting unclassified information in computer and telecommunication
`systems (including voice systems) that are not subject to Section 2315 of Title 10, U.S. Code, or Section
`3502(2) of Title 44, U.S. Code. Cryptographic modules conforming to this standard shall meet the
`applicable security requirements described herein.
`
`This standard was developed by a government and industry working group composed of both users and
`vendors. The working group identified requirements for four security levels for cryptographic modules
`to provide for a wide spectrum of data sensitivity (e.g., low value administrative data, million dollar
`funds transfers, and life protecting data), and a diversity of application environments (e.g., a guarded
`facility, an office, and a completely unprotected location). Each security level offers an increase in
`security over the preceding level. These four increasing levels of security will allow cost-effective
`solutions that are appropriate for different degrees of data sensitivity and different application
`environments.
`
`While the security requirements specified in this standard are intended to maintain the security of a
`cryptographic module, conformance to this standard does not guarantee that a particular module is
`secure. It is the responsibility of the manufacturer of a cryptographic module to build the module in a
`secure manner.
`
`Similarly, the use of a cryptographic module that conforms to this standard in an overall system does
`not guarantee the security of the overall system. The security level of a cryptographic module shall be
`chosen to provide a level of security appropriate for the security requirements of the application and
`environment in which the module is to be utilized and the security services which the module is to
`provide. The responsible authority in each agency or department shall assure that the agency or
`department's computer or telecommunication systems which utilize a cryptographic module provide an
`acceptable level of security for the given application and environment.
`
`NIST emphasizes the importance of computer security awareness and of making information security
`a management priority that is communicated to all employees. Since computer security requirements
`will vary for different applications, organizations should identify their information resources and
`determine the sensitivity to and potential impact of losses. Controls should be based on the potential
`risks and selected from available controls, including administrative policies and procedures, physical and
`environmental controls, information and data controls, software development and acquisition controls,
`and backup and contingency planning.
`
`NIST has developed many of the needed basic controls to protect computer information, and has issued
`standards and guidelines covering both management and technical approaches to computer security.
`These include standards for cryptographic functions which will be implemented in cryptographic modules
`as specified in this standard. This standard is expected to be the foundation for NIST's current and
`future cryptographic standards.
`
`10
`
`IBM-1015
`Page 13 of 56
`
`

`
`FIPS PUB 140-1
`
`1.1
`
`Security Level 1
`
`Security Level 1 provides the lowest level of security. It specifies basic security requirements for a
`cryptographic module (e.g., the encryption algorithm must be a FIPS approved algorithm), but it differs
`from the higher levels in several respects. No physical security mechanisms are required in the module
`beyond the requirement for production-grade equipment.
`
`Examples of Level 1 systems include Integrated Circuit (IC) cards and add-on security products. It is
`commonly felt that IC cards enhance the security of most systems. IC cards may be used as a secure
`storage medium when distributing cryptographic keys and may also implement cryptographic algorithms.
`Many vendors produce personal computer (PC) encryption boards which will meet the Level 1
`requirements. NIST has validated the correct implementation of NIST cryptographic standards in several
`IC cards and encryption boards.
`
`Level 1 allows software cryptographic functions to be performed in a general purpose personal computer
`(PC). NIST believes that such implementations are often appropriate in low-level security applications.
`The implementation of PC cryptographic software may be more cost-effective than hardware-based
`mechanisms. This will enable agencies to avoid the situation that exists today whereby the decision is
`often made not to cryptographically protect data because hardware is considered too expensive.
`
`1.2
`
`Security Level 2
`
`Security Level 2 improves the physical security of a Security Level 1 cryptographic module by adding
`the requirement for tamper evident coatings or seals, or for pick-resistant locks. Tamper evident coatings
`or seals, which are available today, would be placed on a cryptographic module so that the coating or
`seal would have to be broken in order to attain physical access to the plaintext cryptographic keys and
`other critical security parameters within the module. Pick-resistant locks would be placed on covers or
`doors to protect against unauthorized physical access. These requirements provide a low cost means for
`physical security and avoid the cost of the higher level of protection involving hard opaque coatings or
`significantly more expensive tamper detection and zeroization circuitry.
`
`Level 2 provides for role-based authentication in which a module must authenticate that an operator is
`authorized to assume a specific role and perform a corresponding set of services.
`
`Level 2 also allows software cryptography in multi-user timeshared systems when used in conjunction
`with a C2 or equivalent trusted operating system. The ratings C2, B1 and B2 ratings are in accordance
`with the TCSEC (see Appendix C). Many security experts feel that a trusted operating system is needed
`in order for software cryptography to be implemented with a level of trust comparable to hardware
`cryptography. This enables multi-user timeshared systems to implement cryptographic functions in
`software when this level of security is cost effective.
`
`11
`
`IBM-1015
`Page 14 of 56
`
`

`
`FIPS PUB 140-1
`
`1.3
`
`Security Level 3
`
`Security Level 3 requires enhanced physical security which is generally available in many existing
`commercial security products. Unlike Security Level 2 which employs locks to protect against
`tampering with a cryptographic module, or employs coatings or seals to detect when tampering has
`occurred, Level 3 attempts to prevent the intruder from gaining access to critical security parameters held
`within the module. For example, a multi-chip embedded module must be contained in a strong
`enclosure, and if a cover is removed or a door is opened, the critical security parameters are zeroized.
`As another example, a module must be enclosed in a hard, opaque potting material to deter access to
`the contents.
`
`Level 3 provides for identity-based authentication, which is stronger than the role based-authentication
`used in Level 2. A module must authenticate the identity of an operator and verify that the identified
`operator is authorized to assume a specific role and perform a corresponding set of services.
`
`Level 3 provides stronger requirements for entering and outputting critical security parameters. The data
`ports used for critical security parameters must be physically separated from other data ports.
`Furthermore, the parameters must either be entered into or output from the module in encrypted form
`(in which case they may travel through enclosing or intervening systems) or be directly entered into or
`output from the module (without passing through enclosing or intervening systems) using split
`knowledge procedures.
`
`Level 3 allows software cryptography in multi-user timeshared systems when a B1 or equivalent trusted
`operating system is employed along with a trusted path for the entry and output of critical security
`parameters. A B1 or better trusted operating system with a trusted path would have the capability to
`protect cryptographic software and critical security parameters from other untrusted software that may
`run on the system. Such a system could prevent plaintext from being mixed with ciphertext, and it could
`prevent the unintentional transmission of plaintext keys.
`
`1.4
`
`Security Level 4
`
`Security Level 4 provides the highest level of security. Although most existing products do not meet
`this level of security, some products are commercially available which meet many of the Level 4
`requirements. Level 4 physical security provides an envelope of protection around the cryptographic
`module. Whereas the tamper detection circuits of lower level modules may be bypassed, the intent of
`Level 4 protection is to detect a penetration of the device from any direction. For example, if one
`attempts to cut through the enclosure of the cryptographic module, the attempt should be detected and
`all critical security parameters should be zeroized. Level 4 devices are particularly useful for operation
`in a physically unprotected environment where an intruder could possibly tamper with the device.
`
`Level 4 also protects a module against a com

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket