<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Cryptographic_Module_Testing_Laboratory</id>
	<title>Cryptographic Module Testing Laboratory - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Cryptographic_Module_Testing_Laboratory"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Cryptographic_Module_Testing_Laboratory&amp;action=history"/>
	<updated>2026-04-30T15:57:48Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Cryptographic_Module_Testing_Laboratory&amp;diff=3594561&amp;oldid=prev</id>
		<title>imported&gt;Another day in the trench at 08:21, 1 March 2024</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Cryptographic_Module_Testing_Laboratory&amp;diff=3594561&amp;oldid=prev"/>
		<updated>2024-03-01T08:21:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Computer security testing laboratory}}&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Cryptographic Module Testing Laboratory&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;CMTL&amp;#039;&amp;#039;&amp;#039;) is an [[information technology]] (IT) [[computer security]] testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the [[FIPS 140-2]] [[United States|U.S.]] [[United States Government|Government]] standard.&lt;br /&gt;
&lt;br /&gt;
The [[NIST|National Institute of Standards and Technology]] (NIST) [[NVLAP|National Voluntary Laboratory Accreditation Program]] (NVLAP) accredits CMTLs to meet [[CMVP|Cryptographic Module Validation Program]] (CMVP) standards and procedures.&lt;br /&gt;
&lt;br /&gt;
This has been replaced by [https://csrc.nist.gov/Presentations/2002/FIPS-140-2-and-the-Cryptographic-Module-Validation FIPS 140-2 and the Cryptographic Module Validation Program (CMVP)].&lt;br /&gt;
&lt;br /&gt;
==CMTL requirements==&lt;br /&gt;
These laboratories must meet the following requirements:&lt;br /&gt;
&lt;br /&gt;
* NIST Handbook 150, NVLAP Procedures and General Requirements&lt;br /&gt;
* NIST Handbook 150-17 Information Technology Security Testing - Cryptographic Module Testing&lt;br /&gt;
**NVLAP Specific Operations Checklist for Cryptographic Module Testing&lt;br /&gt;
&lt;br /&gt;
==FIPS 140-2 in relation to the Common Criteria==&lt;br /&gt;
&lt;br /&gt;
A CMTL can also be a [[Common Criteria]] (CC) Testing Laboratory ([[Common Criteria Testing Laboratory|CCTL]]). &lt;br /&gt;
The CC and FIPS 140-2 are different in the abstractness and focus of evaluation. FIPS 140-2 testing is against a defined cryptographic module and provides a suite of conformance tests to four [[FIPS 140-2#Security Levels|FIPS 140 security levels]]. FIPS 140-2 describes the requirements for cryptographic modules and includes such areas as [[physical security]], [[key management]], self tests, [[RBAC|roles]] and services, etc. The standard was initially developed in 1994 - prior to the development of the CC. The CC is an evaluation against a [[Protection Profile]] (PP), or security target (ST). Typically, a PP covers a broad range of products.&lt;br /&gt;
&lt;br /&gt;
* A CC evaluation does not supersede or replace a validation to either [[FIPS 140-1]], [[FIPS140-2]] or [[FIPS 140-3]]. The four security levels in FIPS 140-1 and FIPS 140-2 do not map directly to specific CC [[Evaluation Assurance Level|EAL]]s or to CC functional requirements. A CC certificate cannot be a substitute for a FIPS 140-1 or FIPS 140-2 certificate.&lt;br /&gt;
&lt;br /&gt;
If the operational environment is a modifiable operational environment, the operating system requirements of the [[Common Criteria]] are applicable at FIPS Security Levels 2 and above.&lt;br /&gt;
&lt;br /&gt;
* FIPS 140-1 required evaluated operating systems that referenced the [[Trusted Computer System Evaluation Criteria]] (TCSEC) classes C2, B1 and B2. However, TCSEC is no longer in use and has been replaced by the Common Criteria. Consequently, FIPS 140-2 now references the Common Criteria.&lt;br /&gt;
&lt;br /&gt;
[[FIPS 140-2]] or [[FIPS 140-3]] validation efforts can be in some parts reused in Common Criteria evaluations, specifically in areas related to [[entropy source]] and cryptographic algorithms.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
* [https://web.archive.org/web/20060811213603/http://csrc.nist.gov/cryptval/ List of CMTLs] from [[NIST]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer security procedures]]&lt;br /&gt;
[[Category:Tests]]&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Another day in the trench</name></author>
	</entry>
</feed>