Why you need to use a FIPS 140-2 validated cryptomodule

If you are performing an application security verification according to the OWASP Application Security Verification Standard (ASVS) verification requirements, you will need to make sure that any cryptographic functions are being performed by a FIPS 140-2 validated cryptomodule.

A cryptomodule, whether it is a software library or a hardware device, basically consists of three parts:


 * Components that implement cryptographic algorithms (symmetric and asymmetric algorithms, hash algorithms, random number generator algorithms, and message authentication code algorithms)


 * Components that call and manage cryptographic functions and their inputs and outputs (inputs and outputs include cryptographic keys and so-called critical security parameters)


 * A physical container around the components that implement cryptographic algorithms and the components that call and manage cryptographic functions

The security of a cryptomodule and its services depends on the correct implementation and integration of each of these three parts. While most folks understand that implementing cryptographic algorithms correctly is a hard thing to do, most folks do not understand that calling and managing cryptographic functions and their inputs and outputs, and ensuring the secure construction of the physical container around the components, are equally important in determining the security of a cryptomodule and its services.

While there certainly are shortcomings in the FIPS 140-2 program, using a FIPS 140-2 validated cryptomodule certainly provides a greater chance that the cryptomodule is providing the services that you are expecting from it.

Helpful hints:


 * CMVP: http://csrc.nist.gov/groups/STM/cmvp/index.html
 * CAVP: http://csrc.nist.gov/groups/STM/cavp/index.html