This document cache provides backup versions of documents cited in the
nfoWorks folio on NIST Cryptography Resources. These
materials are retained for backup as verifiable sources for citations,
quotation, commentary, and analysis. In general, the primary source
location should always be cited, with these cache entries provided as secondary
(cache) locations, if at all.
Document Cache material is viewable and downloadable from this page only
if explicitly permitted by its author/publisher. Other materials are
embargoed and, although cited here, are not downloadable here.
Formats of cached versions are PDF and MHT:
- PDF: cached PDF documents can be open
in browsers or downloaded for saving local copies. First check the size
of the PDF and decide whether to force download rather than allow in-browser
opening.
- MHT: cached MHTML (multipart/related)
pages are directly viewable in some browsers, including Internet Explorer
versions up to IE8. Recent versions (9-10+) of Internet Explorer will
always download the file instead as a security precaution. The
downloaded MHTML document can be viewed locally using Internet Explorer.
This format captures a complete web page, including its images and other
direct inclusions.
-
n130101b1-NIST-CryptographicToolkit.mht
(65kB in cache)
- NIST. Cryptographic Toolkit (web page).
NIST Computer Security Division, Computer Security Resource Center,
Cryptographic Technology. Available on the Internet at <http://csrc.nist.gov/groups/ST/toolkit/index.html>.
Accessed on 2013-01-05T21:43Z.
This provides a menu to the different cryptographic modules for
which NIST provides standards and guidance. Additional information on
the testing and verification of modules, and the standards applicable to the
qualification of cryptographic modules is found under the Cryptographic
Module Verification Program (CMVP).
-
n130101b2-NIST-CMVP-CryptographicModuleVerificationProgram.mht
(76kB
in cache)
- NIST. Cryptographic Module Verification P:rogram (CMVP)
(web page). NIST Computer Security Division, Computer Security
Resource Center, Security Management and Assurance. Available on the
Internet at <http://csrc.nist.gov/groups/STM/cmvp/>.
Accessed on 2013-01-05T21:48Z.
This source explains the CMVP and provides guidance on the FIPS
140-1 and FIPS 140-2 Federal Information Processing Standards on Security
Requirements for Cryptographic Modules. Additional resources and
guidance are also offered.
-
n130101b3-NIST-CMVP-Standards.mht
(75kB in cache)
- NIST. Standards. NIST Computer Security
Division, Computer Security Resource Center, Security Management and
Assurance. Available on the Internet at <http://csrc.nist.gov/groups/STM/cmvp/standards.html>.
Accessed on 2013-01-05T21:51Z.
The FIPS 140-2 (effective 2001-11-15), FIPS 140-1 (2002-05-25 ending of
transition) and relevant International Standards are described along with
supporting guidance, supplemental specifications, and verification
information.
-
n130101b4-NIST-CSRC-Publications.mht
(74kB in cache)
- NIST. Publications (web page). NIST Computer
Security Division, Computer Security Resource Center. Available on the
Internet at <http://csrc.nist.gov/publications/>.
Accessed on 2013-01-07T23:55Z.
This page explains and links to the different categories of NIST
publication on computer security, including materials of the Cryptographic
Toolkit and the Cryptographic Module Verification Program (CMVP). Use
the current on-line version of this page to find the latest resources.
Consult the lists linked from this page for the current publication
of FIPS Standards, Drafts, and the SP800 Series of Computer Security Special
Publications.
-
n130101b5-NIST-SP800-Series.mht
(141kB in cache)
- NIST. Computer Security Special Publications (web
page). NIST Computer Security Division, Computer Security Resource
Center, January 8, 2013. Available on the Internet at <http://csrc.nist.gov/publications/PubsSPs.html>.
Accessed on 2013-01-13T22:36Z.
The SP800 Series of NIST Special Publications provide technical and
procedural information for a variety of computer security and cryptography
topics. There is technical content beyond the level of detail of the
FIPS publications to which they relate.
The latest version of this compilation should be consulted for the
current status of these documents. The list of in-progress draft
documents and archived older documents can be found through the sidebar of
this page.
-
n130101b6-NIST-FIPS-140-1-SecurityRequirements.pdf
(351kB in cache)
- NIST. Security Requirements for Cryptographic Modules
(PDF document). Federal Information Processing Standard 140-1.
U.S. Department of Commerce, National Institute of Science and Technology,
1994 January 11. Available on the Internet at <http://csrc.nist.gov/publications/fips/fips140-1/fips1401.pdf>.
Linked from the NIST-CMVP-Standards page.
Accessed on 2013-01-07T23:01Z.
This specification was superseded by FIPS 140-2 on May 25, 2001.
Modules certified under FIPS 140-1 prior to that time retain their
certification. Certification under FIPS 140-2 was required for new
certifications after that date. This document is referenced in
publications on older, stable cryptographic modules that continue in use.
It is preserved here for historical purposes.
-
n130101b7-NIST-SP800-29-140-1to-2.pdf
(326kB in cache)
- Snouffer, Ray., Lee, Annabelle., Oldehoeft, Arch. A
Comparison of the Security Requirements for Cryptographic Modules in FIPS
140-1 and FIPS 140-2 (PDF document). NIST Security Technology Group,
Computer Security Division, Special Publication 800-29, June 2001.
Available on the Internet at <http://csrc.nist.gov/publications/nistpubs/800-29/sp800-29.pdf>.
Linked from the NIST-CMVP-Standards page. Accessed
on 2013-01-14T01:29Z.
This document provides comparison between the original FIPS 140-1
and improvements made in it successor, FIPS 140-2. Although FIPS 140-1
has been retired, previous verifications of cryptographic modules conducted
under FIPS 140-1 remain in effect.
-
n130101b8-NIST-FIPS-140-2-SecurityRequirements.pdf
(1,432kB
in cache)
- NIST. Security Requirements for Cryptographic
Modules (PDF document). Federal Information Processing Standard 140-2.
U.S. Department of Commerce, National Institute of Science and Technology,
2001-05-25; with change notices through 2002-12-03. Available on the
Internet at <http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf>.
Linked from the NIST-CMVP-Standards page.
Accessed on 2004-03-21T17:13Z.
This is the current (January 2013) specification of security
requirements. Its sections and separately-published annexes are relevant
to many cryptographic primitives of current interest.
A proposed FIPS 140-3 draft dated 2009-12-11 was issued for public
comments. The draft has not been revised nor advanced to a FIPS standard
at this time
-
n130101b9-NIST-CMVP-CAVP-CryptoAlgVerification.mht
(133kB in cache)
- NIST. Cryptographic Algorithm Verification Program
(web page). NIST Computer Security Division, Computer Security Resource
Center, January 8, 2013. Available on the Internet at <http://csrc.nist.gov/groups/STM/cavp/>.
Accessed on 2013-01-19T21:06Z.
This program provides for verification of NIST approved and
recommended cryptographic algorithms. For each algorithm type, the
applicable specifications are identified, followed by the applicable
verification tests. Although applying these tests independently does not
qualify for certification, it is valuable to self-administer comparable
verifications as part of private demonstration that a new implementation of
one of the cryptographic algorithms is qualified. These are the (January
2013) currently-approved algorithms covered by the verification program:
Symmetric Ciphers: AES, Triple-DES, Skipjack
XTS-AES: AES Mode for stored data encryption (profile of IEEE Std
1619-2007)
Asymmetric-Key Ciphers and Digital Signatures: DSA, RSA, and ECDSA
Secure Hash Standards: SHA1, SHA256, SHA512 and variations
Random Number Generators
Deterministic Random Bit Generators (i.e., pseudo-random
generators)
Key Establishment Schemes
Message Authentication Codes (MAC): CMAC, CCM, GCM, GMAC, HMAC
Key Derivation: KBKDF
Some algorithm component (primitive) tests
Retired Validation Tests
-
n130101b10-NIST-CSRC-FIPS-Standards.mht
(83kB in cache)
- NIST. FIPS Publications.
NIST Computer Security Division, Computer Security Resource Center, May 22,
2012. Available on the Internet at <http://csrc.nist.gov/publications/PubsFIPS.html>.
Accessed on 2013-01-25T04:38Z.
There are a variety of Federal Information Processing Standards
applicable to computer system security in U.S. Federal Government operations.
Some apply to specific cryptographic methods and other security practices
including FIPS 140-2, its extensions, and companion standards.
-
n130101c1-Wikipedia-CryptographicHashFunction.mht
(405kb in cache)
- Available on the Internet at <http://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=537036494>.
Accessed on 2013-02-12T01:44Z.
This overview provides general information on the nature of
cryptographic hash functions, properties that are important and nomenclature
concerning security models about them. A variety of popular hash
functions is summarized. There are cross-references to more-extensive
details.
-
n130101c2-Wikipedia-SecureHashAlgorithms.mht
(260kb in cache)
- Available on the Internet at <http://en.wikipedia.org/w/index.php?title=Secure_Hash_Algorithm&oldid=536510446>.
Accessed on 2013-02-13T22:52Z.
This provides a brief catalog and portal to information on the
individual SHA algorithms in the NIST Secure Hash Standards.
-
n130101c3-Wikipedia-SHA1.mht
(401kb
in cache)
- Available on the Internet at <http://en.wikipedia.org/w/index.php?title=SHA-1&oldid=538112650>.
Accessed on 2013-02-13T23:00Z.
There is a significant amount of churning on this page, although
the basic explanation of SHA1 and its place in the SHA family provides useful
information.
Attribution:
- Hamilton, Dennis E.
- NIST Cryptography Resources Document Cache. nfoWorks
nfoNote folder n130101-cache 0.02, March 28, 2013. Accessed at <http://nfoWorks.org/notes/2013/01/n130101-cache/>.
- Revision History:
0.02 2013-03-28-12:50 SHA Materials
- Gathering materials on SHA, especially SHA-1, for the initial
verification and custom implementation support. These are in the
n130101cN family.
- 0.01 2013-03-18-20:22 Essential Materials
- The general, essential materials on NIST Cryptographic Resources are cached as part of
background and organization. These tend to have n130101bN prefixes.
Access to PDF and MHTML is clarified in a note. The attribution is
corrected.
- 0.00 2013-01-02-14:14 Establish Initial Placeholder for
Material
- Establish the Initial Cache Directory.

|
|
created 2013-01-02-14:00-0800 (pst) by
orcmid
$$Author: Orcmid $
$$Date: 14-05-04 13:59 $
$$Revision: 36 $
|