FIPS 140-2 Annex C

Annex C:
Approved Random Number Generators
for FIPS PUB 140-2,
Security Requirements for
Cryptographic Modules
Apostol Vassilev
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8930
U.S. Department of Commerce
Penny Pritzker, Secretary
National Institute of Standards and Technology
Willy May, Director Under Secretary
of Commerce for Standards and Technology
January 4, 2016
Draft
Annex C: Approved Random Number Generators
for FIPS PUB 140-2,
Security Requirements for Cryptographic Modules
1.
Introduction
Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for
Cryptographic Modules, specifies the security requirements that are to be satisfied by the cryptographic
module utilized within a security system protecting sensitive information within computer and
telecommunications systems (including voice systems). The standard provides four increasing, qualitative
levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range
of potential applications and environments in which cryptographic modules may be employed. The
security requirements cover eleven areas related to the secure design and implementation of the
cryptographic module. These areas include the following:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Cryptographic Module Specification
Cryptographic Module Ports and Interfaces
Roles, Services, and Authentication
Finite State Model
Physical Security
Operational Environment
Cryptographic Key Management
Electromagnetic Interference/Electromagnetic Compatibility (EMI/EMC)
Self Tests
Design Assurance
Mitigation of Other Attacks
The Cryptographic Module Validation Program (CMVP - www.nist.gov/cmvp) validates cryptographic
modules to FIPS PUB 140-2 and other cryptography based standards. The CMVP is a joint effort between
NIST and the Communications Security Establishment Canada (CSEC - www.cse-cst.gc.ca). Modules
validated as conforming to FIPS PUB 140-2 are accepted by the Federal agencies of both countries for the
protection of sensitive information (United States) or Designated information (Canada).
In the CMVP, vendors of cryptographic modules use independent, accredited testing laboratories to have
their modules tested. Organizations wishing to have validations performed would contract with the
laboratories for the required services.
2.
Purpose
The purpose of this document is to provide a list of Approved random number generators applicable to
FIPS PUB 140-2.
i
Table of Contents
ANNEX C: APPROVED RANDOM NUMBER GENERATORS ............................................................... 1
Transitions .................................................................................................................................................. 1
Deterministic Random Number Generators ............................................................................................... 1
Nondeterministic Random Number Generators ......................................................................................... 1
Document Revisions ....................................................................................................................................... 2
End of Document ............................................................................................................................................ 3
ii
ANNEX C: APPROVED RANDOM NUMBER GENERATORS
Annex C provides a list of Approved random number generators applicable to FIPS PUB 140-2. There are
two basic classes: deterministic and nondeterministic. A deterministic RNG consists of an algorithm that
produces a sequence of bits from an initial value called a seed. A nondeterministic RNG produces output
that is dependent on some unpredictable physical source that is outside human control.
Transitions
National Institute of Standards and Technology, Recommendation for Transitioning the Use of
Cryptographic Algorithms and Key Lengths, Special Publication 800-131A, November 2015. Sections
relevant to this Annex: 1 and 4.
Deterministic Random Number Generators
1.
National Institute of Standards and Technology, Recommendation for Random Number Generation
Using Deterministic Random Bit Generators, Special Publication 800-90A, June 2015.
Nondeterministic Random Number Generators
There are no FIPS Approved nondeterministic random number generators.
Computer Security Division
Page 1
01/04/2016
Document Revisions
Date
03-17-2003
01-31-2005
01-24-2007
03-19-2007
10/18/2007
07/21/2009
11/24/2010
06/14/2011
07/26/2011
02/16/2012
07/02/2015
01-04-2016
Change
Deterministic Random Number Generators, Number 3:
Updated: corrected reference to Appendix A.2.4 - Digital Signatures Using
Reversible Public Key Cryptography for the Financial Services Industry (rDSA)
Deterministic Random Number Generators, Number 5:
Added: NIST-Recommended Random Number Generator Based on ANSI X9.31
Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms
Deterministic Random Number Generators, Number 6:
Added: Recommendation for Random Number Generation Using Deterministic
Random Bit Generators
Deterministic Random Number Generators, Number 6:
Updated: Revision date - Recommendation for Random Number Generation Using
Deterministic Random Bit Generators (Revised)
Updated: Modified URL's
Updated: Modified URL to archived FIPS 186-2.
Deterministic Random Number Generators, Number 4:
Updated: Revision date - ANSI X9.62-2005 – Annex D: Public Key Cryptography
for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm
(ECDSA)
Deterministic Random Number Generators, Number 4:
Removed - ANSI X9.62-2005 – Annex D: Public Key Cryptography for the
Financial Services Industry: The Elliptic Curve Digital Signature Algorithm
(ECDSA) and replaced with ANSI X9.62-1998 – Annex A.4: Public Key
Cryptography for the Financial Services Industry: The Elliptic Curve Digital
Signature Algorithm (ECDSA)
Note: ANSI X9.62-2005 – Annex D: Public Key Cryptography for the Financial
Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) is
incorporated in NIST SP 800-90 (Number 6) HMAC_DRBG
Added new Section: Transitions
Added: Recommendation for Transitioning the Use of Cryptographic Algorithms
and Key Lengths
Deterministic Random Number Generators, Number 6:
Updated document name, revision date and reference URL - Recommendation for
Random Number Generation Using Deterministic Random Bit Generators.
Deterministic Random Number Generators, Removed Number 1, 2, 5. Updated
reference to SP 800-90A in new Number 3.s
Removed the following from the approved list:
2. American Bankers Association, Digital Signatures Using Reversible Public
Key Cryptography for the Financial Services Industry (rDSA), ANSI X9.311998 - Appendix A.2.4.
3. American Bankers Association, Public Key Cryptography for the Financial
Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA),
ANSI X9.62-1998 – Annex A.4
Computer Security Division
Page 2
01/04/2016
End of Document
Computer Security Division
Page 3
01/04/2016