The Federal Information Processing Standard (FIPS) 140-3, titled "Security Requirements for Cryptographic Modules," is the latest iteration in a series of U.S. government standards aimed at ensuring the security of cryptographic modules. Here are the key details regarding FIPS 140-3:
Overview:Purpose: FIPS 140-3 defines the security requirements that cryptographic modules must meet to protect sensitive but unclassified information in computer and telecommunication systems.Issued By: The National Institute of Standards and Technology (NIST) in collaboration with the Canadian Centre for Cyber Security (CCCS).Effective Date: FIPS 140-3 was approved on March 22, 2019, and became effective on September 22, 2019.
Key Changes and Features:Alignment with International Standards:FIPS 140-3 is based on ISO/IEC 19790:2012 for security requirements and ISO/IEC 24759:2017 for testing requirements, with modifications allowed by the Cryptographic Module Validation Program (CMVP).Security Levels:Like its predecessor, FIPS 140-3 maintains four qualitative levels of security (Level 1 to Level 4), each providing an increasing level of security assurance:Level 1: Basic security requirements for cryptographic modules.Level 2: Adds requirements for physical tamper-evidence and role-based authentication.Level 3: Includes physical tamper-resistance, identity-based authentication, and separation of interfaces for critical security parameters.Level 4: Adds environmental failure protection, multi-factor authentication, and enhanced physical security measures.Module Types:The standard now explicitly defines five types of modules for validation: hardware, firmware, software, hybrid-software, and hybrid-firmware modules.Key Management and Authentication:Enhanced requirements for key management, including lifecycle management from generation to destruction.New authentication requirements, especially for higher levels, like multi-factor identity-based authentication at Level 4.Cryptographic Algorithms:Modules must use algorithms approved by NIST, with considerations for transitioning to post-quantum cryptography.Testing and Validation:Introduces a more structured approach to testing with derived test requirements (DTRs) based on ISO/IEC standards.The Cryptographic Module Validation Program (CMVP) oversees the validation process, ensuring modules meet the standard's requirements.Transition from FIPS 140-2:FIPS 140-3 testing began on September 22, 2020. There's an overlapping period where both FIPS 140-2 and 140-3 were accepted for validation, but FIPS 140-2 submissions ended on September 21, 2021 (with extensions for existing applications until April 1, 2022).FIPS 140-2 validations remain valid until September 21, 2026, after which they will move to a historical list.Implementation and Compliance:Organizations using cryptographic modules for sensitive data protection should ensure their modules are validated against FIPS 140-3, particularly for compliance with government regulations or for secure information handling in regulated industries.
Importance:Security Assurance: Provides a framework for ensuring cryptographic modules are secure against various attacks, both logical and physical.Compliance: Critical for government agencies and entities in regulated sectors like finance and healthcare needing to comply with specific security standards.Market Access: Often a requirement for selling security-related products to government or other entities needing to adhere to these standards.
FIPS 140-3 represents an evolution in cryptographic module standards, aiming to address modern security threats and align with global standards while maintaining a robust security framework for cryptographic operations.