Announcing Revised Draft Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules, 65753-65755 [E9-29567]
Download as PDF
Federal Register / Vol. 74, No. 237 / Friday, December 11, 2009 / Notices
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: [070321067–91333–02]
Announcing Revised Draft Federal
Information Processing Standard
(FIPS) 140–3, Security Requirements
for Cryptographic Modules
AGENCY: National Institute of Standards
and Technology (NIST), Commerce.
ACTION: Notice; request for comments.
jlentini on DSKJ8SOYB1PROD with NOTICES
SUMMARY: The National Institute of
Standards and Technology (NIST)
announces the Revised Draft Federal
Information Processing Standard 140–3,
Security Requirements for
Cryptographic Modules, for public
review and comment. The draft
standard, designated ‘‘Revised Draft
FIPS 140–3,’’ is proposed to supersede
FIPS 140–2.
DATES: Comments must be received on
or before March 11, 2010.
ADDRESSES: Written comments may be
sent to: Chief, Computer Security
Division, Information Technology
Laboratory, Attention: Dr. Michaela
Iorga, 100 Bureau Drive, Mail Stop 8930,
National Institute of Standards and
Technology, Gaithersburg, MD 20899–
8930. Electronic comments may also be
sent to: FIPS140–3@nist.gov. The
proposed revised standard can be
reviewed electronically at https://
csrc.nist.gov/publications/
PubsDrafts.html. The complete set of all
comments received in response to the
July 2007 notice and NIST’s responses
to these comments may be accessed at
https://csrc.nist.gov/groups/ST/
documents/CommentsFIPS140–
3_draft1.pdf. The current FIPS 140–2
standard can be found at: https://
csrc.nist.gov/publications/
PubsFIPS.html.
FOR FURTHER INFORMATION CONTACT: Dr.
Michaela Iorga, Computer Security
Division, 100 Bureau Drive, Mail Stop
8930, National Institute of Standards
and Technology, Gaithersburg, MD
20899–8930, Telephone (301) 975–8431.
SUPPLEMENTARY INFORMATION: FIPS 140–
1, Security Requirements for
Cryptographic Modules, was issued in
1994 and was superseded by FIPS 140–
2 in 2001. FIPS 140–2 identifies
requirements for four security levels for
cryptographic modules to provide for a
wide spectrum of data sensitivity (e.g.,
low value administrative data, million
dollar funds transfers, and life
protecting data), and a diversity of
application environments.
VerDate Nov<24>2008
17:33 Dec 10, 2009
Jkt 220001
Under NIST’s Cryptographic Module
Validation Program (CMVP), over 2000
modules have been tested by accredited
private-sector laboratories and validated
as conforming to FIPS 140–1 and FIPS
140–2. FIPS 140–2 provided that it be
reviewed within five years to address
new and revised requirements that
might be needed to meet technological
and economic changes.
In 2005, NIST announced that it
planned to develop FIPS 140–3 and
solicited public comments on new and
revised requirements for cryptographic
systems. On January 12, 2005, a notice
was published in the Federal Register
(70 FR 2122), soliciting public
comments on a proposed revision of
FIPS 140–2. The comments received by
NIST supported reaffirmation of the
standard, but suggested technical
modifications to address advances in
technology that had occurred after the
standard had been approved. Using
these comments, NIST prepared a Draft
FIPS 140–3 (hereafter referred to as the
‘‘2007 Draft’’), which was announced for
review and comment in the Federal
Register (72 FR 38566) on July 13, 2007.
NIST developed the Revised Draft FIPS
140–3 that is announced in this notice
using the comments received in
response to the July 13, 2007 notice and
the feedback on requirements for
software cryptographic modules
obtained during the March 18, 2008
FIPS 140–3 Software Security Workshop
organized by NIST.
Comments and questions regarding
the 2007 Draft were submitted by
approximately 45 entities, including
two U.S. federal government
organizations, two government
organizations of other countries, thirty
private sector and research
organizations, ten private individuals,
and one or more anonymous reviewers.
These comments have all been made
available by NIST at https://csrc.nist.gov/
groups/ST/documents/
CommentsFIPS140–3_draft1.pdf.
None of the comments opposed the
approval of a revised standard. Some
comments asked for clarification of the
text of the standard or recommended
editorial and formatting changes. Other
comments suggested modifying
requirements, or applying the
requirements at a different security
level. All of the suggestions, questions
and recommendations within the scope
of the FIPS revision were carefully
reviewed, and changes were made to the
standard, where appropriate. Some
reviewers submitted questions or raised
issues that are related but outside the
scope of this FIPS. Comments that were
outside of scope of the FIPS revision
were deferred for later consideration in
PO 00000
Frm 00022
Fmt 4703
Sfmt 4703
65753
the context of the NIST/CMVP
supporting documents.
The primary interests and issues that
were raised in the comments included
implementability, testability,
performance, usability and cost.
Detailed technical comments covered
issues including the following:
Authentication mechanisms; noninvasive attacks; random bit generators
(RBGs); randomness of Initialization
Vectors (IVs); operating system
requirements; zeroization; status
indicators; issues regarding the
cryptographic module boundary and
computing environment; and issues
pertaining to self-testing requirements.
The following is a summary and
analysis of the comments received and
NIST’s responses to them:
Comment: The 2007 Draft required
the module to directly prevent the
selection of weak passwords for
password-based authentication
mechanisms. Eighteen commenters
stated that this requires standardized
guidance on weak passwords and
Personal Identification Numbers (PINs)
and also implies that modules are
required to store multi-language
dictionaries, which is impractical in
many cases.
Response: NIST removed the
requirement that the cryptographic
module directly prevent selection of
weak passwords.
Comment: The 2007 Draft required
that default authentication data be
unique per module unit delivered if the
module employs default authentication
data to control access to the module for
first-time authentication. Six
commenters stated that this is an
onerous requirement for vendors who
deliver high volume products, and is
unnecessary given the requirement to
change the authentication data upon
first use.
Response: NIST removed the
requirement that the default
authentication data be unique per
module unit delivered.
Comment: The 2007 Draft specified
Mitigation of Simple Power Analysis
(SPA) attacks at Security Level 4. Eight
commenters stated that this requirement
should be introduced at a lower level
(Security Level 2 or 3) for consistency
with tamper evidence requirements,
with stronger requirements at Security
Levels 3 and 4. Similarly, the 2007 Draft
specified that Mitigation of Differential
Power Analysis (DPA) attacks is
required starting with the Security Level
4. Eight commenters stated that this
requirement should be introduced at
Security Level 2 or 3.
Response: The tamper evidence
mechanisms specified at Security Level
E:\FR\FM\11DEN1.SGM
11DEN1
jlentini on DSKJ8SOYB1PROD with NOTICES
65754
Federal Register / Vol. 74, No. 237 / Friday, December 11, 2009 / Notices
2 provide security against an
unprepared attacker. While SPA and
DPA attacks leave no physical traces of
the attack, they require, in addition to
access to the module’s power line,
minimum equipment to collect the data;
therefore, the attacker has to be
prepared with appropriate equipment.
NIST determined that protection against
non-invasive attacks is required starting
with the Security Level 3 to provide
consistent protection for the modules
Critical Security Parameters (CSPs).
Comment: Four comments were
received about the manual entry and
display of Sensitive Security Parameters
(SSP), such as passwords. These
comments focused on password change
operations, since other requirements
apply to password entry for
authentication.
Response: The standard does not
mandate visual verification of SSPs
during manual entry; rather, it permits
the option that, when SSPs are long and
possibly in hexadecimal representation,
they may be temporarily displayed to
allow visual verification for improved
accuracy. This flexibility is retained in
the Revised Draft FIPS 140–3. In
addition, the concept of the Trusted
Channels and its use for input/output of
SSPs at Security Levels 3 and 4 is
clarified in the Revised Draft FIPS 140–
3.
Comment: Twenty-one comments
were received regarding conflicts in the
specifications pertaining to Random Bit
Generator (RBG) entropy sources and
difficulties in satisfying the RBG selftesting requirements during conditional
self-tests.
Response: NIST considered all
comments related to the Random Bit
Generator (RBG) Entropy Source Test,
and removed the RBG Entropy Source
Test from the list of required
conditional self-tests in the Revised
Draft FIPS 140–3. For consistency, the
Revised Draft FIPS 140–3 defines the
minimum entropy as the min-entropy
defined in NIST SP 800–90,
‘‘Recommendation for Random Number
Generation Using Deterministic Random
Bit Generators (Revised)’’, as amended,
and points to it for additional
requirements.
Comment: Thirty-one commenters
stated that ambiguities in the Operating
System Requirements for Modifiable
Operational Environments needed to be
clarified. Depending on how the various
terms were interpreted these
requirements might be impossible to
satisfy.
Response: The entire section 4.5.1
‘‘Operating System Requirements for
Modifiable Operational Environments’’
has been re-written to improve clarity.
VerDate Nov<24>2008
17:33 Dec 10, 2009
Jkt 220001
Comment: Three comments were
received indicating that thorough
review of the 2007 Draft required access
to all annexes pertaining to the
standard.
Response: All annexes (A through F)
pertaining to the Revised Draft FIPS
140–3 have been made available for
concurrent review with the Revised
Draft FIPS.
Comment: One comment was received
recommending a key status indicator to
show whether the module is keyed, not
keyed, or zeroized.
Response: The Revised Draft FIPS
requires a physical or logical status
indicator, but only for self-tests and
error states.
Comment: Two comments were
received noting that zeroization for
physical security reasons must occur in
a sufficiently small time period to
prevent the recovery of sensitive data,
but no such constraints were indicated
in the 2007 Draft.
Response: NIST updated the Revised
Draft FIPS to specify that zeroization
shall be immediate and noninterruptible and shall occur in a
sufficiently small time period so as to
prevent the recovery of the sensitive
data between the time zeroization is
initiated and the actual zeroization
completed.
Comment: Two comments were
received stating that operating system
requirements disallowed most
debuggers and suggested an exception
for maintenance mode.
Response: NIST restored the
maintenance role and allowed
debuggers when operating in
maintenance mode. The operating
system shall prevent all operators and
running processes from modifying
running cryptographic processes (i.e.,
loaded and executing cryptographic
program images) only when not in the
maintenance mode. In this case, running
processes refer to all processes,
cryptographic or not, not owned or
initiated by the operating system (i.e.,
operator-initiated).
Comment: The 2007 Draft defined the
cryptographic module’s electrical power
as a physical port. Two comments were
received regarding the requirements
applicable to the power port in order to
restrict unintended information flow.
Response: NIST defined a ‘‘power
interface’’ for the cryptographic module
and replaced all references to ‘‘power
port’’ with ‘‘power interface’’ in the
Revised Draft FIPS. No additional
requirements related to power interfaces
were added. Clarifications triggered by
questions related to this topic will be
addressed in standard’s supplementary
PO 00000
Frm 00023
Fmt 4703
Sfmt 4703
documentation such as the ‘‘FIPS 140–
3 Implementation Guidance’’.
Comment: Six comments were
received regarding the specified false
acceptance rate (FAR) of 1 in 10∧8 for
authentication mechanisms in the 2007
Draft, and noted that the 2007 Draft was
silent with respect to false rejection rate
(FRR). Some comments suggested that
the engineering tradeoffs required to
achieve an FAR of 10∧8 will have a
strongly negative impact on usability.
Response: NIST reviewed the
requirements for group authentication
mechanism and acknowledges the
impact of such requirement on usability
and on the FRR of cryptographic
modules using multi-factor
authentication mechanisms. The
requirement was removed from the
Revised Draft FIPS and will be
addressed in the Implementation
Guidance or other supplemental
documentation.
Comment: Eleven comments were
received regarding the self-testing
requirements specified by the 2007
Draft. The commenters considered the
requirements inappropriate for devices
with aggressive power conservation
modes, such as newer portable devices
and embedded devices.
Response: NIST reviewed the self-test
section and redefined the cases when
the pre-operational self-tests must be
performed.
Comment: One comment was received
highlighting a conflict between self-tests
for random bit generators (RBGs) and
NIST Special Publication (SP) 800–90.
Response: NIST reviewed the self-test
section and removed the conflicting
requirement from the continuous RBG
test section of the draft.
In addition to the public comment
period, NIST hosted a public workshop
on March 18, 2008 to obtain additional
feedback on requirements for software
crypto modules. The FIPS 140–3
Software Security Workshop addressed
a range of topics, including the
following: single user mode at Security
Level 1; the logical boundary of a
software module; the modifiable
operational environment; audit logs;
software integrity tests; ‘‘firmware’’
modules; security strength of a crypto
module; and the number of security
levels for software modules. Based on
the combination of public comments
and the discussions at the FIPS 140–3
Software Security Workshop, NIST
implemented further changes to
rationalize and simplify the security
levels in the Revised Draft FIPS 140–3.
In particular, the Revised Draft FIPS
140–3 specifies four security levels
instead of five, reintroduces the notion
of firmware cryptographic module and
E:\FR\FM\11DEN1.SGM
11DEN1
Federal Register / Vol. 74, No. 237 / Friday, December 11, 2009 / Notices
defines the security requirements for it,
limits the overall security level for
software cryptographic modules of
Security Level 2, and removes the
formal model requirement.
The following significant substantive
differences between this Revised Draft
FIPS 140–3 and the current FIPS 140–
2 standard are noted: Inclusion of a
separate section for software security;
limiting the overall security level for
software cryptographic modules of
Security Level 2; requirement for
modules to mitigate against the noninvasive attacks when validating at
higher security levels; introduction of
the concept of public security
parameters; allowing modules to defer
various self-tests until specified
conditions are met; removing the formal
model requirement; and strengthening
the requirements for integrity testing.
The Revised Draft FIPS 140–3 can be
found at https://csrc.nist.gov/
publications/PubsDraft.html, and is
available for public review and
comment.
Prior to the submission of this
proposed revised standard to the
Secretary of Commerce for review and
approval, it is essential that
consideration is given to the needs and
views of the public, users, the
information technology industry, and
Federal, State and local government
organizations. The purpose of this
notice is to solicit such views.
Authority: Federal Information Processing
Standards (FIPS) are issued by the National
Institute of Standards and Technology after
approval by the Secretary of Commerce
pursuant to Section 5131 of the Information
Technology Management Reform Act of 1996
and the Federal Information Security
Management Act of 2002 (Pub. L. 107–347).
E.O. 12866: This notice has been
determined not be significant for the
purpose of E.O. 12866.
Dated: December 7, 2009.
Patrick Gallagher,
Director.
[FR Doc. E9–29567 Filed 12–10–09; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
International Trade Administration
jlentini on DSKJ8SOYB1PROD with NOTICES
Mission Statement; Solar Energy Trade
Mission to India, February 15–19, 2010
Department of Commerce.
Amendment.
AGENCY:
ACTION:
Mission Description
The United States Department of
Commerce, International Trade
Administration, U.S. and Foreign
VerDate Nov<24>2008
17:33 Dec 10, 2009
Jkt 220001
Commercial Service (CS), is organizing
the second Solar Energy Trade Mission
to India from February 15 to 19, 2010.
Led by a senior Department of
Commerce official, the mission will
continue to build on the Department’s
efforts to open the burgeoning Indian
solar market to U.S. firms and to
position U.S. companies to seize export
opportunities as India gears up to
rapidly expand its solar energy
capabilities. Ideal trade mission
participants will be representatives of
leading U.S. manufacturers of solar
technology, including utility-scale
technologies such as photovoltaic and
concentrated solar power, and
manufacturers of products such as solar
street lighting, solar home lighting, and
solar water pumping systems. The
mission will also be open to a limited
number of representatives of trade
associations, councils and groups in the
solar energy sector. The mission will
visit three cities: New Delhi, Bangalore,
and Mumbai, where participants will
receive market briefings and meet with
key government decision makers and
prospective private sector partners
during customized, one-on-one
meetings.
Commercial Setting
India is facing a critical shortage of
energy. Due to its sustained economic
growth, the country suffers from an
energy deficit, which stands to worsen
as India’s economy and population
continue to grow. As a result of the
energy shortage, Indian consumers face
frequent periods of power outages, and
prices for electricity are high. In
addition to the need for more capacity,
the Indian government at both state and
national levels has begun to recognize
the threat posed by global climate
change. As such, the Government of
India (GOI) acknowledges that some of
the country’s energy needs must be met
with cleaner sources of power. All of
these issues have compelled the GOI to
move forward with an action plan to
address its energy needs.
In 2008, the GOI released its National
Action Plan on Climate Change
(NAPCC), part of which addressed
energy needs and particularly focused
on solar energy as an area of
development. Concurrent with the
development of the NAPCC, three
Indian states—Rajasthan, Gujarat, and
Karnataka—have progressively
launched their own efforts to develop
solar projects. Since the NAPCC was
initially released, CS India has
aggressively worked to facilitate the
development of the nascent Indian solar
market, focusing on the aforementioned
states. In March 2009 the first U.S. Solar
PO 00000
Frm 00024
Fmt 4703
Sfmt 4703
65755
Energy Trade Mission to India took
place, which brought 14 U.S. companies
to India, along with Deputy Assistant
Secretarial leadership from the
Departments of Commerce and Energy,
and a board member from the U.S.
Export-Import Bank. The mission
successfully introduced U.S. solar
energy technology to relevant Indian
officials, and, as a result of the mission,
U.S. firms have signed memoranda of
understanding to develop 5MW solar
projects in Rajasthan. Prior to this trade
mission Indian officials acknowledged
that they were not familiar with U.S.
solar technologies, and that they
believed European firms had more
proven products. The trade mission
helped to highlight the strength and cost
effectiveness of U.S. technologies—a
crucial step for positioning U.S. firms in
this market.
As a follow-up to the first trade
mission, in July 2009 CS India
organized a solar finance roundtable in
Mumbai, which brought together key
government decision makers from
Rajasthan, project finance bankers, and
two U.S. energy developers. Lack of
project finance options had emerged as
a stumbling block to the development of
utility-scale solar power projects in
Rajasthan. Roundtable participants
addressed critical issues such as power
purchase agreements, renewable energy
purchase obligations, transmission line
issues and tariff structures, and the
Rajasthan government officials
confirmed that they would put the
policy mechanisms in place to make the
solar projects financially viable.
Building on the positive momentum
to date, CS India approached the U.S.
Trade and Development Agency to fund
an orientation visit to the U.S. by
officials from Rajasthan. The visit,
which will take place during October
2009, will coincide with Solar Power
International, the largest solar industry
trade show in the United States. By
attending this show the Indian officials
will be exposed to the variety and depth
of U.S. solar technologies, and they will
visit demonstration sites to see firsthand
the integration of solar energy into the
U.S. power grid.
The second Solar Trade Mission to
India will continue to build on the
above efforts and will help keep U.S.
firms at the forefront of this emerging
market. In particular, the mission will
continue CS India’s extensive efforts to
positively influence policy and will
allow U.S. manufacturers to weigh in
with Indian officials as crucial
government decisions are soon to be
made that will impact the direction this
market will take.
E:\FR\FM\11DEN1.SGM
11DEN1
Agencies
[Federal Register Volume 74, Number 237 (Friday, December 11, 2009)]
[Notices]
[Pages 65753-65755]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E9-29567]
[[Page 65753]]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: [070321067-91333-02]
Announcing Revised Draft Federal Information Processing Standard
(FIPS) 140-3, Security Requirements for Cryptographic Modules
AGENCY: National Institute of Standards and Technology (NIST),
Commerce.
ACTION: Notice; request for comments.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
announces the Revised Draft Federal Information Processing Standard
140-3, Security Requirements for Cryptographic Modules, for public
review and comment. The draft standard, designated ``Revised Draft FIPS
140-3,'' is proposed to supersede FIPS 140-2.
DATES: Comments must be received on or before March 11, 2010.
ADDRESSES: Written comments may be sent to: Chief, Computer Security
Division, Information Technology Laboratory, Attention: Dr. Michaela
Iorga, 100 Bureau Drive, Mail Stop 8930, National Institute of
Standards and Technology, Gaithersburg, MD 20899-8930. Electronic
comments may also be sent to: FIPS140-3@nist.gov. The proposed revised
standard can be reviewed electronically at https://csrc.nist.gov/publications/PubsDrafts.html. The complete set of all comments received
in response to the July 2007 notice and NIST's responses to these
comments may be accessed at https://csrc.nist.gov/groups/ST/documents/CommentsFIPS140-3_draft1.pdf. The current FIPS 140-2 standard can be
found at: https://csrc.nist.gov/publications/PubsFIPS.html.
FOR FURTHER INFORMATION CONTACT: Dr. Michaela Iorga, Computer Security
Division, 100 Bureau Drive, Mail Stop 8930, National Institute of
Standards and Technology, Gaithersburg, MD 20899-8930, Telephone (301)
975-8431.
SUPPLEMENTARY INFORMATION: FIPS 140-1, Security Requirements for
Cryptographic Modules, was issued in 1994 and was superseded by FIPS
140-2 in 2001. FIPS 140-2 identifies requirements for four security
levels for cryptographic modules to provide for a wide spectrum of data
sensitivity (e.g., low value administrative data, million dollar funds
transfers, and life protecting data), and a diversity of application
environments.
Under NIST's Cryptographic Module Validation Program (CMVP), over
2000 modules have been tested by accredited private-sector laboratories
and validated as conforming to FIPS 140-1 and FIPS 140-2. FIPS 140-2
provided that it be reviewed within five years to address new and
revised requirements that might be needed to meet technological and
economic changes.
In 2005, NIST announced that it planned to develop FIPS 140-3 and
solicited public comments on new and revised requirements for
cryptographic systems. On January 12, 2005, a notice was published in
the Federal Register (70 FR 2122), soliciting public comments on a
proposed revision of FIPS 140-2. The comments received by NIST
supported reaffirmation of the standard, but suggested technical
modifications to address advances in technology that had occurred after
the standard had been approved. Using these comments, NIST prepared a
Draft FIPS 140-3 (hereafter referred to as the ``2007 Draft''), which
was announced for review and comment in the Federal Register (72 FR
38566) on July 13, 2007. NIST developed the Revised Draft FIPS 140-3
that is announced in this notice using the comments received in
response to the July 13, 2007 notice and the feedback on requirements
for software cryptographic modules obtained during the March 18, 2008
FIPS 140-3 Software Security Workshop organized by NIST.
Comments and questions regarding the 2007 Draft were submitted by
approximately 45 entities, including two U.S. federal government
organizations, two government organizations of other countries, thirty
private sector and research organizations, ten private individuals, and
one or more anonymous reviewers. These comments have all been made
available by NIST at https://csrc.nist.gov/groups/ST/documents/CommentsFIPS140-3_draft1.pdf.
None of the comments opposed the approval of a revised standard.
Some comments asked for clarification of the text of the standard or
recommended editorial and formatting changes. Other comments suggested
modifying requirements, or applying the requirements at a different
security level. All of the suggestions, questions and recommendations
within the scope of the FIPS revision were carefully reviewed, and
changes were made to the standard, where appropriate. Some reviewers
submitted questions or raised issues that are related but outside the
scope of this FIPS. Comments that were outside of scope of the FIPS
revision were deferred for later consideration in the context of the
NIST/CMVP supporting documents.
The primary interests and issues that were raised in the comments
included implementability, testability, performance, usability and
cost. Detailed technical comments covered issues including the
following: Authentication mechanisms; non-invasive attacks; random bit
generators (RBGs); randomness of Initialization Vectors (IVs);
operating system requirements; zeroization; status indicators; issues
regarding the cryptographic module boundary and computing environment;
and issues pertaining to self-testing requirements.
The following is a summary and analysis of the comments received
and NIST's responses to them:
Comment: The 2007 Draft required the module to directly prevent the
selection of weak passwords for password-based authentication
mechanisms. Eighteen commenters stated that this requires standardized
guidance on weak passwords and Personal Identification Numbers (PINs)
and also implies that modules are required to store multi-language
dictionaries, which is impractical in many cases.
Response: NIST removed the requirement that the cryptographic
module directly prevent selection of weak passwords.
Comment: The 2007 Draft required that default authentication data
be unique per module unit delivered if the module employs default
authentication data to control access to the module for first-time
authentication. Six commenters stated that this is an onerous
requirement for vendors who deliver high volume products, and is
unnecessary given the requirement to change the authentication data
upon first use.
Response: NIST removed the requirement that the default
authentication data be unique per module unit delivered.
Comment: The 2007 Draft specified Mitigation of Simple Power
Analysis (SPA) attacks at Security Level 4. Eight commenters stated
that this requirement should be introduced at a lower level (Security
Level 2 or 3) for consistency with tamper evidence requirements, with
stronger requirements at Security Levels 3 and 4. Similarly, the 2007
Draft specified that Mitigation of Differential Power Analysis (DPA)
attacks is required starting with the Security Level 4. Eight
commenters stated that this requirement should be introduced at
Security Level 2 or 3.
Response: The tamper evidence mechanisms specified at Security
Level
[[Page 65754]]
2 provide security against an unprepared attacker. While SPA and DPA
attacks leave no physical traces of the attack, they require, in
addition to access to the module's power line, minimum equipment to
collect the data; therefore, the attacker has to be prepared with
appropriate equipment. NIST determined that protection against non-
invasive attacks is required starting with the Security Level 3 to
provide consistent protection for the modules Critical Security
Parameters (CSPs).
Comment: Four comments were received about the manual entry and
display of Sensitive Security Parameters (SSP), such as passwords.
These comments focused on password change operations, since other
requirements apply to password entry for authentication.
Response: The standard does not mandate visual verification of SSPs
during manual entry; rather, it permits the option that, when SSPs are
long and possibly in hexadecimal representation, they may be
temporarily displayed to allow visual verification for improved
accuracy. This flexibility is retained in the Revised Draft FIPS 140-3.
In addition, the concept of the Trusted Channels and its use for input/
output of SSPs at Security Levels 3 and 4 is clarified in the Revised
Draft FIPS 140-3.
Comment: Twenty-one comments were received regarding conflicts in
the specifications pertaining to Random Bit Generator (RBG) entropy
sources and difficulties in satisfying the RBG self-testing
requirements during conditional self-tests.
Response: NIST considered all comments related to the Random Bit
Generator (RBG) Entropy Source Test, and removed the RBG Entropy Source
Test from the list of required conditional self-tests in the Revised
Draft FIPS 140-3. For consistency, the Revised Draft FIPS 140-3 defines
the minimum entropy as the min-entropy defined in NIST SP 800-90,
``Recommendation for Random Number Generation Using Deterministic
Random Bit Generators (Revised)'', as amended, and points to it for
additional requirements.
Comment: Thirty-one commenters stated that ambiguities in the
Operating System Requirements for Modifiable Operational Environments
needed to be clarified. Depending on how the various terms were
interpreted these requirements might be impossible to satisfy.
Response: The entire section 4.5.1 ``Operating System Requirements
for Modifiable Operational Environments'' has been re-written to
improve clarity.
Comment: Three comments were received indicating that thorough
review of the 2007 Draft required access to all annexes pertaining to
the standard.
Response: All annexes (A through F) pertaining to the Revised Draft
FIPS 140-3 have been made available for concurrent review with the
Revised Draft FIPS.
Comment: One comment was received recommending a key status
indicator to show whether the module is keyed, not keyed, or zeroized.
Response: The Revised Draft FIPS requires a physical or logical
status indicator, but only for self-tests and error states.
Comment: Two comments were received noting that zeroization for
physical security reasons must occur in a sufficiently small time
period to prevent the recovery of sensitive data, but no such
constraints were indicated in the 2007 Draft.
Response: NIST updated the Revised Draft FIPS to specify that
zeroization shall be immediate and non-interruptible and shall occur in
a sufficiently small time period so as to prevent the recovery of the
sensitive data between the time zeroization is initiated and the actual
zeroization completed.
Comment: Two comments were received stating that operating system
requirements disallowed most debuggers and suggested an exception for
maintenance mode.
Response: NIST restored the maintenance role and allowed debuggers
when operating in maintenance mode. The operating system shall prevent
all operators and running processes from modifying running
cryptographic processes (i.e., loaded and executing cryptographic
program images) only when not in the maintenance mode. In this case,
running processes refer to all processes, cryptographic or not, not
owned or initiated by the operating system (i.e., operator-initiated).
Comment: The 2007 Draft defined the cryptographic module's
electrical power as a physical port. Two comments were received
regarding the requirements applicable to the power port in order to
restrict unintended information flow.
Response: NIST defined a ``power interface'' for the cryptographic
module and replaced all references to ``power port'' with ``power
interface'' in the Revised Draft FIPS. No additional requirements
related to power interfaces were added. Clarifications triggered by
questions related to this topic will be addressed in standard's
supplementary documentation such as the ``FIPS 140-3 Implementation
Guidance''.
Comment: Six comments were received regarding the specified false
acceptance rate (FAR) of 1 in 10[caret]8 for authentication mechanisms
in the 2007 Draft, and noted that the 2007 Draft was silent with
respect to false rejection rate (FRR). Some comments suggested that the
engineering tradeoffs required to achieve an FAR of 10[caret]8 will
have a strongly negative impact on usability.
Response: NIST reviewed the requirements for group authentication
mechanism and acknowledges the impact of such requirement on usability
and on the FRR of cryptographic modules using multi-factor
authentication mechanisms. The requirement was removed from the Revised
Draft FIPS and will be addressed in the Implementation Guidance or
other supplemental documentation.
Comment: Eleven comments were received regarding the self-testing
requirements specified by the 2007 Draft. The commenters considered the
requirements inappropriate for devices with aggressive power
conservation modes, such as newer portable devices and embedded
devices.
Response: NIST reviewed the self-test section and redefined the
cases when the pre-operational self-tests must be performed.
Comment: One comment was received highlighting a conflict between
self-tests for random bit generators (RBGs) and NIST Special
Publication (SP) 800-90.
Response: NIST reviewed the self-test section and removed the
conflicting requirement from the continuous RBG test section of the
draft.
In addition to the public comment period, NIST hosted a public
workshop on March 18, 2008 to obtain additional feedback on
requirements for software crypto modules. The FIPS 140-3 Software
Security Workshop addressed a range of topics, including the following:
single user mode at Security Level 1; the logical boundary of a
software module; the modifiable operational environment; audit logs;
software integrity tests; ``firmware'' modules; security strength of a
crypto module; and the number of security levels for software modules.
Based on the combination of public comments and the discussions at the
FIPS 140-3 Software Security Workshop, NIST implemented further changes
to rationalize and simplify the security levels in the Revised Draft
FIPS 140-3. In particular, the Revised Draft FIPS 140-3 specifies four
security levels instead of five, reintroduces the notion of firmware
cryptographic module and
[[Page 65755]]
defines the security requirements for it, limits the overall security
level for software cryptographic modules of Security Level 2, and
removes the formal model requirement.
The following significant substantive differences between this
Revised Draft FIPS 140-3 and the current FIPS 140-2 standard are noted:
Inclusion of a separate section for software security; limiting the
overall security level for software cryptographic modules of Security
Level 2; requirement for modules to mitigate against the non-invasive
attacks when validating at higher security levels; introduction of the
concept of public security parameters; allowing modules to defer
various self-tests until specified conditions are met; removing the
formal model requirement; and strengthening the requirements for
integrity testing.
The Revised Draft FIPS 140-3 can be found at https://csrc.nist.gov/publications/PubsDraft.html, and is available for public review and
comment.
Prior to the submission of this proposed revised standard to the
Secretary of Commerce for review and approval, it is essential that
consideration is given to the needs and views of the public, users, the
information technology industry, and Federal, State and local
government organizations. The purpose of this notice is to solicit such
views.
Authority: Federal Information Processing Standards (FIPS) are
issued by the National Institute of Standards and Technology after
approval by the Secretary of Commerce pursuant to Section 5131 of
the Information Technology Management Reform Act of 1996 and the
Federal Information Security Management Act of 2002 (Pub. L. 107-
347).
E.O. 12866: This notice has been determined not be significant for
the purpose of E.O. 12866.
Dated: December 7, 2009.
Patrick Gallagher,
Director.
[FR Doc. E9-29567 Filed 12-10-09; 8:45 am]
BILLING CODE 3510-13-P