nfoWorks Hard Hat Beginnings

n130301 nfoWorks nfoNote
 NIST Cryptography Resources
Document Cache

nfoWorks>notes>
2013>01>
n130101-cache>

default>
 0.02 2014-05-04 13:59 -0700


This document cache provides backup versions of documents cited in the nfoWorks folio on NIST Cryptography Resources.  These materials are retained for backup as verifiable sources for citations, quotation, commentary, and analysis.  In general, the primary source location should always be cited, with these cache entries provided as secondary (cache) locations, if at all. 

Document Cache material is viewable and downloadable from this page only if explicitly permitted by its author/publisher.  Other materials are embargoed and, although cited here, are not downloadable here.

Formats of cached versions are PDF and MHT:

 
n130101b1-NIST-CryptographicToolkit.mht (65kB in cache)
NIST.  Cryptographic Toolkit  (web page).  NIST Computer Security Division, Computer Security Resource Center, Cryptographic Technology.  Available on the Internet at <http://csrc.nist.gov/groups/ST/toolkit/index.html>.  Accessed on 2013-01-05T21:43Z.
   This provides a menu to the different cryptographic modules for which NIST provides standards and guidance.  Additional information on the testing and verification of modules, and the standards applicable to the qualification of cryptographic modules is found under the Cryptographic Module Verification Program (CMVP).
  
n130101b2-NIST-CMVP-CryptographicModuleVerificationProgram.mht (76kB in cache
NIST.  Cryptographic Module Verification P:rogram (CMVP) (web page).  NIST Computer Security Division, Computer Security Resource Center, Security Management and Assurance.  Available on the Internet at <http://csrc.nist.gov/groups/STM/cmvp/>.  Accessed on 2013-01-05T21:48Z.
   This source explains the CMVP and provides guidance on the FIPS 140-1 and FIPS 140-2 Federal Information Processing Standards on Security Requirements for Cryptographic Modules.  Additional resources and guidance are also offered.

  
n130101b3-NIST-CMVP-Standards.mht (75kB in cache)
NIST.  Standards.  NIST Computer Security Division, Computer Security Resource Center, Security Management and Assurance.  Available on the Internet at <http://csrc.nist.gov/groups/STM/cmvp/standards.html>.  Accessed on 2013-01-05T21:51Z.
  The FIPS 140-2 (effective 2001-11-15), FIPS 140-1 (2002-05-25 ending of transition) and relevant International Standards are described along with supporting guidance, supplemental specifications, and verification information.
  
n130101b4-NIST-CSRC-Publications.mht (74kB in cache)
NIST.  Publications (web page).  NIST Computer Security Division, Computer Security Resource Center.  Available on the Internet at <http://csrc.nist.gov/publications/>.  Accessed on 2013-01-07T23:55Z.
   This page explains and links to the different categories of NIST publication on computer security, including materials of the Cryptographic Toolkit and the Cryptographic Module Verification Program (CMVP).  Use the current on-line version of this page to find the latest resources.
   Consult the lists linked from this page for the current publication of FIPS Standards, Drafts, and the SP800 Series of Computer Security Special Publications.
    
n130101b5-NIST-SP800-Series.mht (141kB in cache)
NIST.  Computer Security Special Publications (web page).  NIST Computer Security Division, Computer Security Resource Center, January 8, 2013.  Available on the Internet at <http://csrc.nist.gov/publications/PubsSPs.html>.  Accessed on 2013-01-13T22:36Z.
   The SP800 Series of NIST Special Publications provide technical and procedural information for a variety of computer security and cryptography topics.  There is technical content beyond the level of detail of the FIPS publications to which they relate.
   The latest version of this compilation should be consulted for the current status of these documents.  The list of in-progress draft documents and archived older documents can be found through the sidebar of this page.

  
n130101b6-NIST-FIPS-140-1-SecurityRequirements.pdf (351kB in cache)
NIST.  Security Requirements for Cryptographic Modules (PDF document).  Federal Information Processing Standard 140-1.  U.S. Department of Commerce, National Institute of Science and Technology, 1994 January 11.  Available on the Internet at <http://csrc.nist.gov/publications/fips/fips140-1/fips1401.pdf>.  Linked from the NIST-CMVP-Standards page.  Accessed on 2013-01-07T23:01Z.
   This specification was superseded by FIPS 140-2 on May 25, 2001.  Modules certified under FIPS 140-1 prior to that time retain their certification.  Certification under FIPS 140-2 was required for new certifications after that date.  This document is referenced in publications on older, stable cryptographic modules that continue in use.  It is preserved here for historical purposes.
       
n130101b7-NIST-SP800-29-140-1to-2.pdf (326kB in cache)
Snouffer, Ray., Lee, Annabelle., Oldehoeft, Arch.  A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 (PDF document).  NIST Security Technology Group, Computer Security Division, Special Publication 800-29, June 2001.  Available on the Internet at <http://csrc.nist.gov/publications/nistpubs/800-29/sp800-29.pdf>.   Linked from the NIST-CMVP-Standards page. Accessed on 2013-01-14T01:29Z.
   This document provides comparison between the original FIPS 140-1 and improvements made in it successor, FIPS 140-2.  Although FIPS 140-1 has been retired, previous verifications of cryptographic modules conducted under FIPS 140-1 remain in effect.

  
n130101b8-NIST-FIPS-140-2-SecurityRequirements.pdf (1,432kB in cache)
NIST.  Security Requirements for Cryptographic Modules (PDF document).  Federal Information Processing Standard 140-2.  U.S. Department of Commerce, National Institute of Science and Technology, 2001-05-25; with change notices through 2002-12-03.  Available on the Internet at <http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf>.  Linked from the NIST-CMVP-Standards page.  Accessed on 2004-03-21T17:13Z.
   This is the current (January 2013) specification of security requirements.  Its sections and separately-published annexes are relevant to many cryptographic primitives of current interest.
   A proposed FIPS 140-3 draft dated 2009-12-11 was issued for public comments.  The draft has not been revised nor advanced to a FIPS standard at this time
   
n130101b9-NIST-CMVP-CAVP-CryptoAlgVerification.mht (133kB in cache)
NIST.  Cryptographic Algorithm Verification Program (web page).  NIST Computer Security Division, Computer Security Resource Center, January 8, 2013.  Available on the Internet at <http://csrc.nist.gov/groups/STM/cavp/>.  Accessed on 2013-01-19T21:06Z.
   This program provides for verification of NIST approved and recommended cryptographic algorithms.  For each algorithm type, the applicable specifications are identified, followed by the applicable verification tests.  Although applying these tests independently does not qualify for certification, it is valuable to self-administer comparable verifications as part of private demonstration that a new implementation of one of the cryptographic algorithms is qualified.  These are the (January 2013) currently-approved algorithms covered by the verification program:
   Symmetric Ciphers: AES, Triple-DES, Skipjack
   XTS-AES: AES Mode for stored data encryption (profile of IEEE Std 1619-2007)
   Asymmetric-Key Ciphers and Digital Signatures: DSA, RSA, and ECDSA
   Secure Hash Standards: SHA1, SHA256, SHA512 and variations
   Random Number Generators
   Deterministic Random Bit Generators (i.e., pseudo-random generators)
   Key Establishment Schemes
   Message Authentication Codes (MAC): CMAC, CCM, GCM, GMAC, HMAC
   Key Derivation: KBKDF
   Some algorithm component (primitive) tests
   Retired Validation Tests

  
n130101b10-NIST-CSRC-FIPS-Standards.mht (83kB in cache)
NIST.  FIPS Publications.  NIST Computer Security Division, Computer Security Resource Center, May 22, 2012.  Available on the Internet at <http://csrc.nist.gov/publications/PubsFIPS.html>.  Accessed on 2013-01-25T04:38Z.
   There are a variety of Federal Information Processing Standards applicable to computer system security in U.S. Federal Government operations.  Some apply to specific cryptographic methods and other security practices including FIPS 140-2, its extensions, and companion standards.
  
n130101c1-Wikipedia-CryptographicHashFunction.mht (405kb in cache)
Available on the Internet at <http://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=537036494>.  Accessed on 2013-02-12T01:44Z. 
   This overview provides general information on the nature of cryptographic hash functions, properties that are important and nomenclature concerning security models about them.  A variety of popular hash functions is summarized.  There are cross-references to more-extensive details.
  
n130101c2-Wikipedia-SecureHashAlgorithms.mht (260kb in cache)
Available on the Internet at <http://en.wikipedia.org/w/index.php?title=Secure_Hash_Algorithm&oldid=536510446>.  Accessed on 2013-02-13T22:52Z.
   This provides a brief catalog and portal to information on the individual SHA algorithms in the NIST Secure Hash Standards.
  
n130101c3-Wikipedia-SHA1.mht (401kb in cache)
Available on the Internet at <http://en.wikipedia.org/w/index.php?title=SHA-1&oldid=538112650>.  Accessed on 2013-02-13T23:00Z.
   There is a significant amount of churning on this page, although the basic explanation of SHA1 and its place in the SHA family provides useful information.

Attribution:

Hamilton, Dennis E.
NIST Cryptography Resources Document Cache.   nfoWorks nfoNote folder n130101-cache 0.02, March 28, 2013.  Accessed at <http://nfoWorks.org/notes/2013/01/n130101-cache/>.
Revision History:
0.02 2013-03-28-12:50 SHA Materials
Gathering materials on SHA, especially SHA-1, for the initial verification and custom implementation support.  These are in the n130101cN family.
0.01 2013-03-18-20:22 Essential Materials
The general, essential materials on NIST Cryptographic Resources are cached as part of background and organization.  These tend to have n130101bN prefixes.  Access to PDF and MHTML is clarified in a note.  The attribution is corrected.
0.00 2013-01-02-14:14 Establish Initial Placeholder for Material
Establish the Initial Cache Directory.

Construction Structure (Hard Hat Area)

Creative Commons License You are navigating nfoWorks.
This work is licensed under a
Creative Commons Attribution 2.5 License.

created 2013-01-02-14:00-0800 (pst) by orcmid
$$Author: Orcmid $
$$Date: 14-05-04 13:59 $
$$Revision: 36 $