Font Size Change

HOMEIT SecurityIT Security Evaluation and CertificationIPA/ISEC:JCMVP(Japan Cryptographic Module Validation Program)

PRINT PAGE

IT Security

IPA/ISEC:JCMVP(Japan Cryptographic Module Validation Program)

Last Updated: 22 May 2015

Japan Cryptographic Module Validation Program

JCMVP Japan Cryptographic Module Validation Program

The Japan Cryptographic Module Validation Program (JCMVP) has been established with the objective of having third-party entities perform testing and validation procedures systematically so as to enable Cryptographic Module users to recognize precisely and in detail that Cryptographic Modules consisting of hardware, software and/or firmware components, in which Approved Security Functions included in the e-Government Recommended Ciphers List, etc. (e.g. cryptographic functions, hash functions and signature functions) are implemented, appropriately protect the security functions, cryptographic keys, passwords and other sensitive information stored therein. The JCMVP is expected to help the procurement based on "Standards for Information Security Measures for the Central Government Computer Systems (Feburary 2009 (Fourth Edition))"[PDF].

The JCMVP is operated by the Information-technology Promotion Agency, Japan (IPA) as a product certification system.

[JAPANESE]

Information

News/Topics

2015
[New] 22 May 2015 1 module has been added to The Cryptographic Module Validation List.
[New] 22 May 2015 The Register of Cryptographic Algorithm Verified Implementations has been updated.
15 Apr. 2015 The List of Cryptographic Module Testing Laboratories has been updated.
2014
26 Dec. 2014 The List of Cryptographic Module Testing Laboratories has been updated.
24 July 2014 The list of Approved Security Functions has been updated.
24 July 2014 The list of Limited Security Functions has been created.
2013
16 Oct. 2013 1 module has been added to The Cryptographic Module Validation List.
16 Oct. 2013 The List of Cryptographic Module Testing Laboratories has been updated.
7 Oct. 2013 The list of Approved Security Functions has been updated.
23 Aug. 2013 1 module has been added to the Cryptographic Module Validation List.
23 Aug. 2013 The Register of Cryptographic Algorithm Verified Implementations has been updated.
8 July 2013 1 module has been added to the Cryptographic Module Validation List.
24 June 2013 The list of Approved Security Functions has been updated.
24 June 2013 The JCMVP Implementation Guidance has been updated.
14 Feb. 2013 The JCMVP Implementation Guidance has been updated.
14 Feb. 2013 The list of Approved Security Functions has been updated.
2012
6 Nov. 2012 The Register of Cryptographic Algorithm Verified Implementations has been updated.
13 July 2012 The List of Cryptographic Module Testing Laboratories has been updated.
29 June 2012 Cryptographic Module Validation List has been updated.
22 June 2012 The Register of Cryptographic Algorithm Verified Implementations has been updated.
20 Apr. 2012 XTS and GCM have been added to the list of Approved Security Functions.
2 Apr. 2012 4 modules have been added to the Cryptographic Module Validation List.
2 Apr. 2012 The Register of Cryptographic Algorithm Verified Implementations has been updated.
2010
12 Mar. 2010 The List of Cryptographic Module Testing Laboratories has been updated.
10 Mar. 2010 1 module has been added to the Cryptographic Module Validation List.
10 Feb. 2010 The Register of Cryptographic Algorithm Verified Implementations has been updated.
3 Feb. 2010 The vendor information of Cert. #J0006 in the Cryptographic Module Validation List and related Registers of Cryptographic Algorithm Verified Implementations has been updated.
2009
10 Nov. 2009 The reference to the ISO standards used in JCMVP has been made described precisely to specify the exact versions.
10 Nov. 2009 The JCMVP Implementation Guidance has been updated.
2 Nov. 2009 Requirements used in Cryptographic Module Testing have been updated.
2 Nov. 2009 Assurance Continuity has been started in JCMVP.
26 Oct. 2009 The list of Approved Security Functions has been updated.
30 Sep. 2009 Specifications of Cryptographic Algorithm Implementation Testing have been updated.
3 Sep. 2009 The collection of forms has been updated.
20 Aug. 2009 The JCMVP Implementation Guidance has been updated.
2 June 2009 1 module has been added to the Cryptographic Module Validation List.
2 June 2009 The Register of Cryptographic Algorithm Verified Implementations has been updated.
1 Apr. 2009 Specifications of Cryptographic Algorithm Implementation Testing (English version) have been made available.
26 Feb. 2009 The list of Approved Security Functions has been updated.
26 Feb. 2009 The Cryptographic Module Validation List has been updated.
26 Feb. 2009 The Register of Cryptographic Algorithm Verified Implementations has been updated.
18 Feb. 2009 The Cryptographic Module Validation List has been updated.
18 Feb. 2009 The List of Cryptographic Module Testing Laboratories has been updated.
2008
4 Nov. 2008 The Cryptographic Module Validation List has been updated.
4 Nov. 2008 The Register of Cryptographic Algorithm Verified Implementations has been updated.
1 July 2008 The Register of Cryptographic Algorithm Verified Implementations has been created.
2 June 2008 The Cryptographic Module Validation List has been created.
2 June 2008 Documents of this program are translated.
2 June 2008 The page of Approved Security Functions has been created.
2 June 2008 The List of Cryptographic Module Testing Laboratories has been created.

Information from other organizations

Not Available

Contact

For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
E-mail: E-mail address for JCMVP
TEL +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX +81-3-5978-7548