FIPS 140-3 Consulting: CMVP & CAVP

  • Top Notch Experts
  • Save time & money
  • 14 years proven experience
  • Time to market

Click here to find our talks related to FIPS and other standards offered in the most relevant cybersecurity events
By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.

What is FIPS 140-3

FIPS 140-3 is a standard developed by the National Institute of Standards and Technology (NIST) and Communications Security Establishment Canada (CSEC) to define the requirements to be satisfied by a cryptographic module in order to protect sensitive information. It is one of the most important certificates in the security field related to the cryptography that will give a competitive advantage to your product.

This standard is needed for validating the cryptographic modules used by the Federal Agencies (US and Canadian governments) considering as cryptographic module any hardware, software or firmware able to provide cryptographic algorithms contained in the Approved Security Functions defined by the NIST and CSEC.

The standard defines four increasing level of security (SL1, SL2, SL3 and SL4) which cover the 11 areas related to the design and implementation of a cryptographic module.

Generally, vendors must generate the documentation to be submitted to the Cryptographic and Security Testing (CST) laboratories to comply with FIPS 140-3 requirements based on the FIPS 140-3 Derived Test Requirements (DTR) and the Implementation Guidance (IG). Therefore, if the company has not adopted a security certification culture feel overwhelmed by the prospect of needing to generate a huge amount of documentation to pass the validation, as well as to make unexpected or drastic changes in their products.

In our experience, the doubts experimented by the manufacturers in the most cases, result in long delays in the module development and certification, even making it impossible in some cases.

Do not wait and call us to get more information about FIPS 140-3 consulting, our expert evaluation team will assist you to get your module successfully validated.

FIPS 140-3 Validation Process

Firstly, the validation process consists of the validation of the Approved Cryptographic algorithms by the CST laboratory based on the Cryptographic Algorithm Validation Program (CAVP) using a series of tests to verify the correct cryptographic functionality. Secondly, once the CAVP is passed, the entire cryptographic module is validated by the Cryptographic Module Validation Program (CMVP).

The FIPS 140-3 validation process involves mainly the vendor and the CST lab. NIST and CSEC are involved to review the reports submitted by the CST lab to ensure that the CAVP has been passed successfully and that the documentation and module design comply with the standard.

The first step is to get the module listed in the “Cryptographic Module Validation Program FIPS 140-3 Implementation Under Test List which shows the IUT that are being tested by a CST lab. To get the module included in this list, the vendor must send the documentation package to the CST lab.

Once the testing process has been finished by the CST, the module is listed in the “Cryptographic Module Validation Program FIPS 140-3 Modules in Process List” waiting for the documentation to be reviewed by the NIST/CSEC.

Finally, the IUT will be listed in the “FIPS 140-3 Cryptographic Module Validation Lists” as soon as the validation finishes with success.

After a preliminary GAP analysis, our team can accompanies you during the whole process of designing the module, starting by identifying the level of security that it must comply with, which of its parts belong within the boundary, what services it must offer and what states the finite state model have in accordance to the cryptographic operations that are to be implemented. In addition, we will write the entire documentation package composed by the Security Policy, Finite State Model, Functional Specification and Configuration Item List.

Ask us about our FIPS 140-3 consulting service and get your product on the list now reducing the time of validation and getting a better beneficial for you based on our experience and our recognition as valued consultants for laboratories.

Why FIPS 140-3 and how it differs to FIPS 140-2

On May 1, 2019, the Federal Register announced that the Secretary of Commerce had approved Federal Information Processing Standards Publication 140-3 (FIPS 140-3) which supersedes FIPS 140-2 on April 22.

FIPS 140-3 modernizes the standard and essentially makes and indicates that manufactures should now use the international standard ISO/IEC 19790:2012(E) that NIS has developed working closely with international industry to unify several cryptographic security standards. This means that if a crypto graphic module is FIPS 140-3 validated then it can have a higher acceptance internationally than a FIPS 140-2 validated.

In addition, the testing of the requirements specified in this standard will be in accordance with ISO/IEC 24759:2017(E) and with all the modifications, additions or deletions which implies FIPS 140-3.

Timeline

With FIPS 140-3 approved, these are the important dates regarding the proposed timeline for FIPS 140-3 implementation:

  • March22, 2019: FIPS 140-3 Approved
  • September 22, 2019: FIPS 140-3 Effective Date which. This is the date where Labs will already have developed the testing tools for FIPS 140-3 validations and NIST will already have made the SP 800-140 documents available.
  • September 22, 2020: FIPS 140-3 Testing begins.
  • April 01, 2022: FIPS 140-2 Testing ends. CMVP no longer accepts FIPS 140-2 submissions for new validation certificates. The FIPS 140-2 certificates will remain active until their sunset date (22 September 2026), when all FIPS 140-2 certificates are placed on the Historical List .

They already trusted us. Let's talk!

What we offer?

  1. Gap Analysis

    We check the current status of your product and documentation informing you about the changes you need to carry out before going through the development/certification process.

    This service is quite interesting in FIPS 140-3 given that Cryptographic Modules must meet some specific requirements and having a clear understanding of them, avoid to find issues at the last stages of the development.

  2. Consultancy

    If you need your Cryptographic module to become a validated FIPS 140-3 CM; we can offer you the maximum support during the process to get it.

    Writing a Security Policy or a Finite State Machine is not a trivial task if you are not used to.

    We can do it for you allowing you to focus on your product and saving your time and money.

  3. Training

    Does your team need to gain more knowledge in FIPS 140-3? We can provide you a customized training.

    After this training, your team will be able to write FIPS 140-3 documentation on their own.