Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Project Links

2013-2009 Notices

[04-05-2013] -- The First International Cryptographic Module Conference

Bringing experts together from around the world to confer on the topic of cryptographic modules. Discussion on technical topics underlying the implementation of a cryptographic module including physical security, key management, side-channel analysis, key management, cryptographic algorithm implementation testing, standardization (FIPS 140-2, ISO/IEC 19790), validation programs and more. September 24-26, 2013 in Gaithersburg, MD. Registration February through August 2013. Details at: ICMC 2013

[04-23-2012] -- Validation of Transitioning Cryptographic Algorithms and Key Lengths

The Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program  has been updated to include IG G.14 which addresses how the validation of cryptographic algorithms by the CAVP and the validation of cryptographic modules by the CMVP will be affected during the transition as specified in SP 800-131A. This transition guidance was originally drafted as SP800-131B but has been moved to the CMVP Implementation Guidance IG G.14.


[04-23-2012] -- Validating the Transition from FIPS 186-2 to FIPS 186-3

The Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated to include IG G.15 which addresses the transition plan specific to the validation of FIPS 186-2 and FIPS 186-3. This transition plan addresses both the cryptographic algorithm validations and the cryptographic module validations that are conducted by the CAVP and CMVP, respectively. This transition guidance was originally drafted as SP800-131C but has been moved to the CMVP Implementation Guidance IG G.15

[11-24-2010] -- References to NIST Draft Special Publications of interest: NIST Draft Special Publications

Nov. 19, 2010 Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for PIV

Sep. 23, 2010 Special Publication 800-56C DRAFT Recommendation for Key Derivation through Extraction-then-Expansion

Aug. 30, 2010 Special Publication 800-135 DRAFT Recommendation for Existing Application-Specific Key Derivation Functions

Jun. 24, 2010 Special Publication 800-132 DRAFT Recommendation for Password-Based Key Derivation - Part 1: Storage Applications

Jun. 16, 2010 Special Publication 800-131 DRAFT Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes

[08-17-2009] -- Comments received on White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes

Updated comments as of August 14, 2009.


[07-02-2009] -- White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes

Comments are requested on the white paper "The Transitioning of Cryptographic Algorithms and Key Sizes" by August 3, 2009. Please provide comments to CryptoTransitions@nist.gov.

Comments received as of July 24, 2009.

 

Created October 11, 2016, Updated December 04, 2018