<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=FIPS_140-2</id>
	<title>FIPS 140-2 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=FIPS_140-2"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=FIPS_140-2&amp;action=history"/>
	<updated>2026-05-04T11:53:18Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=FIPS_140-2&amp;diff=2014&amp;oldid=prev</id>
		<title>Omaerz: 3 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=FIPS_140-2&amp;diff=2014&amp;oldid=prev"/>
		<updated>2018-06-28T03:58:43Z</updated>

		<summary type="html">&lt;p&gt;3 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title&amp;#039;&amp;#039;&amp;#039;: SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Category&amp;#039;&amp;#039;&amp;#039;: Security Requirements Standard&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Date&amp;#039;&amp;#039;&amp;#039;: 12/3/2002&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Creator&amp;#039;&amp;#039;&amp;#039;: NIST&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;URL&amp;#039;&amp;#039;&amp;#039;: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Description&amp;#039;&amp;#039;&amp;#039;: A set of security requirements specifically pertaining to systems that implement cryptographic mechanisms&lt;br /&gt;
such as encryption, hashing, digital signatures, random number generation or message authentication. The&lt;br /&gt;
security requirements cover areas related to the design and implementation of a cryptographic module.&lt;br /&gt;
These areas include cryptographic module specification; module ports and interfaces; roles, services, and&lt;br /&gt;
authentication; finite state model; physical security; operational environment; cryptographic key&lt;br /&gt;
management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; and design&lt;br /&gt;
assurance. Security Levels 1 through 4 impose increasingly stringent requirements on the requirements,&lt;br /&gt;
with Level 1 not required to demonstrate any physical security requirements or authenticate users, whereas&lt;br /&gt;
Level 4 requires tamper response mechanisms, resistance to a range of environmental conditions and&lt;br /&gt;
identity based authentication of users. This document is the basis of the FIPS 140-2 cryptographic&lt;br /&gt;
certification scheme administered by NIST and Canada&amp;#039;s CSE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Privacy&amp;#039;&amp;#039;&amp;#039;: No stipulations.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security&amp;#039;&amp;#039;&amp;#039;: The document is an information security standard. The document specifies security requirements on the&lt;br /&gt;
functionality and design assurance of cryptographic modules.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Interoperability&amp;#039;&amp;#039;&amp;#039;: The document promotes interoperability by providing a baseline set of requirements for cryptographic&lt;br /&gt;
modules.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Terms&amp;#039;&amp;#039;&amp;#039;: [[Approved]], [[Approved Mode Of Operation]], &lt;br /&gt;
[[Approved Security Function]], [[Authentication Code]], &lt;br /&gt;
[[Automated Key Transport]], [[Compromise]], [[Confidentiality]], &lt;br /&gt;
[[Control Information]], &lt;br /&gt;
[[Critical Security Parameter]], [[Cryptographic Boundary]], [[Cryptographic Key]], [[Cryptographic Key Component]], &lt;br /&gt;
[[Cryptographic Module]], [[Cryptographic Module Security Policy]], &lt;br /&gt;
[[Crypto Officer]], [[Data Path]], &lt;br /&gt;
[[Differential Power Analysis]], [[Digital Signature]], &lt;br /&gt;
[[Electromagnetic Compatibility]], [[Electromagnetic Interference]], &lt;br /&gt;
[[Electronic Key Entry]], [[Encrypted Key]], [[Environmental Failure Protection]], [[Environmental Failure Testing]], [[Error Detection Code]], [[Finite State Model]], [[Firmware]], [[Hardware]],&lt;br /&gt;
[[Hash-based Message Authentication Code]], [[Initialization Vector]], &lt;br /&gt;
[[Input Data]], [[Integrity]], [[Interface]], &lt;br /&gt;
[[Key Encrypting Key]], [[Key Establishment]], [[Key Loader]], [[Key Management]], [[Key Transport]], [[Manual Key Transport]],&lt;br /&gt;
[[Manual Key Entry]], [[Microcode]], [[Operator]], [[Output Data]], [[Password]], [[Personal Identification Number]], [[Physical Protection]], [[Plaintext Key]], [[Port]], [[Private Key]], [[Protection Profile]], [[Public Key]], &lt;br /&gt;
[[Public Key Certificate]], [[Public Key(asymmetric) Cryptographic Algorithm]], [[Random Number Generator]], [[Removable Cover]], [[Secret Key]], &lt;br /&gt;
[[Secret Key (symmetric) Cryptographic Algorithm]], [[Seed Key]], &lt;br /&gt;
[[Simple Power Analysis]], [[Software]], [[Split Knowledge]],&lt;br /&gt;
[[Status Information]], [[System Software]], [[Tamper Detection]], &lt;br /&gt;
[[Tamper Evidence]], [[Tamper Response]], &lt;br /&gt;
[[Target Of Evaluation]], [[TEMPEST]], [[TOE Security Functions]], &lt;br /&gt;
[[TOE Security Policy]], [[Trusted Path]], [[User]], [[Validation Authorities]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Standards]]&lt;br /&gt;
[[Category:Security Requirements Standard]]&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>