Questions tagged [fips-140]
FIPS 140-2 is a U.S. government computer security standard used to accredit cryptographic modules.
48 questions
4 votes
0 answers
113 views
DRBG Best Current Practices
In SOGIS ACM v1.3 (§7.2), the recommended DRBGs are HMAC_DRBG, Hash_DRBG, and CTR_DRBG. Note 50 (DRG-Seeding) states: “The security of DRG derives from a proper seeding of the internal state of the ...
1 vote
0 answers
176 views
is there any Openssl 3.x API for enabling and disabling FIPS mode?
i'm checking to see if there is any API or mechanism to enable or disable the FIPS Mode during the run time. Currently the only way to change the FIPS mode is to enable the algorithm_sect (...
0 votes
1 answer
191 views
What's wrong with BIP32 from NIST's perspective?
BIP32 is listed as Non-Approved Security Functions (see page 29 in 1). I could not find any problem with the primitives used in BIP32. HMAC-SHA512: This is a FIPS-approved algorithm (see page 25 in 1)....
2 votes
1 answer
104 views
Does FIPS have any PAKE algorithms?
Are there any password-authenticated key exchange (PAKE) algorithms in FIPS standards?
1 vote
1 answer
270 views
Could FIPS 186-5 A.1.6 method generate P and Q with different bit size?
refers to FIPS 186-5 document, I have a question about RSA Key generation A.1.6 method, "Generation of Probable Primes with Conditions Based on Auxiliary", my understanding is that, this ...
4 votes
4 answers
4k views
Why did Google Cloud accept a lower FIPS 140-2 Level compared to IBM Cloud?
FIPS 140-2 is a standard which handles cryptographic modules and the ones that organizations use to encrypt data-at-rest and data-in-motion. FIPS 140-2 has 4 levels of security, with level 1 being the ...
0 votes
1 answer
137 views
Python code for 'Verifiable Canonical Generation of the Generator g', FIPS 186-4, returns False [closed]
Edit: if anyone, inexperienced like me, lands on this question, it has been answered at the stackoverflow. Why the Python code, see below, returns false? More context: I am going through the FIPS 186-...
30 votes
4 answers
8k views
Why is FIPS 140-2 compliance controversial?
I was reading the comments of an article about a proposed new implementation of /dev/random in Linux today, and someone remarked that it must be bothersome to go ...
11 votes
2 answers
1k views
RSA Private Exponent Generation according to FIPS 186-4 in openssl v1
I guess this is more of a math problem in a cryptography context so I apologize beforehand if it is not the right place to ask. Basically I have to check whether a certain implementation of RSA key-...
4 votes
2 answers
2k views
Are non-FIPS algorithms allowed to execute at all in a FIPS-compliant system?
If a piece of software is running in FIPS mode and using FIPS-certified cryptographic modules, is it permitted to execute any non-FIPS algorithms even if the security of the system is not uniquely ...
1 vote
2 answers
104 views
What is this meaning disconnected from processes performing key generation or zeroization in cryptography modu
In FIPS 140-2 Part 2:Interfaces and Port in the security policy of product told : 1- "the output data path is provided by the data interfaces and is logically disconnected from processes ...
1 vote
0 answers
339 views
Constructing an XChaCha20-Poly1305 Equivalent using FIPS-140 Primitives
I am playing around with the idea of modelling clustered data storage as a series of AEAD messages. XChaCha20-Poly1305 has nice properties for my intended design, as the ability to use random IVs ...
3 votes
1 answer
208 views
What are the implications of allowing a zero-length GCM nonce?
NIST SP800-38D section 5.2.1.1 is clear that empty nonces are not allowed with GCM, but without explaining the reasoning. My assumption was this is simply because the probability of error (encrypting ...
3 votes
0 answers
2k views
Why does CNG only (seem to) support FIPS-approved AES-GCM decryption but not encryption?
The Security Policy Document: Microsoft Windows FIPS 140 Validation (version 1.4 dated May 7, 2020) mentions in section 2.2: 2.2 FIPS 140-2 Approved Algorithms Cryptographic Primitives Library ...
0 votes
1 answer
414 views
FIPS 140-2 compliance across symmetric and asymmetric primitives
I'm looking to learn more about FIPS compliance. I noted that it seems FIPS 140-2, is a holistic article, that then cites sub articles like FIPS 197... It's tricky to ascertain the full picture. Is ...