Font Size Change

HOMEIT SecurityIT Security Evaluation and CertificationJCMVP (Japan Cryptographic Module Validation Program) Home IPA/ISEC:JCMVP:Documents of this program

PRINT PAGE

IT Security

IPA/ISEC:JCMVP:Documents of this program

Last Updated: 24 June, 2013
Page created: 2 June, 2008

Regulations

The regulations of JCMVP are listed in the following.

Rules and operational manuals are listed in the following. In these documents, terms in bold mean defined one, and terms in bold italic mean a related document.

  Certification Body Applicants Cryptographic Module Testing Laboratories
Rules (JCM-01) Basic Rules for the Japan Cryptographic Module Validation Program[PDF]
(CBM-01)
Rules for the Organization and Operation of the Cryptographic Module Certification Body
(CBM-02)
Rules for the Application Procedures for Cryptographic Module Validation[PDF] (Collection of Forms[MS-Word])
(CBM-03)
Rules for the Application Procedures for Recognition as Cryptographic Module Testing Laboratories[PDF]
Manuals (CBM-01-A)
Operational Manual for Cryptographic Module Validation Services[PDF]
(CBM-01-B)
Operational Manual for Recognition as Cryptographic Module Testing Laboratories[PDF]
(CBM-01-C)
Manual for Management of Personnel of the Cryptographic Module Certification Body[PDF]
   

Requirements used in Cryptographic Module Testing

In March 2006, ISO/IEC 19790:2006 was published, which defines security requirements for cryptographic modules. In July 2008, ISO/IEC 24759:2008 was published, which defines testing requirements for cryptographic modules.
In addition, IPA has approved security functions included in e-Government Recommended Ciphers List, etc. (e.g. cryptographic functions, hash functions and signature functions), and has established the testing requirements for approved security functions.
Requirements used in Cryptographic Module Testing are listed in the following.

  • ISO/IEC 19790:2006 with ISO/IEC 19790:2006/Cor.1:2008
    Information technology — Security techniques — Security requirements for cryptographic modules
  • ISO/IEC 24759:2008
    Information technology — Security techniques — Test requirements for cryptographic modules
  • (ATR-01)
    JCMVP Cryptographic Algorithm Implementation Testing Requirements[PDF](In Japanese)

Note: Cryptographic Module Testing includes Cryptographic Algorithm Implementation Testing.

JCMVP Implementation Guidance

The following shows the guidance about operations in this program, and interpretations of security requirements for cryptographic modules and of Test requirements for cryptographic modules.

Requirements used in
Cryptographic Algorithm Implementation Testing

Contact

For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
E-mail: E-mail address for JCMVP
TEL +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX +81-3-5978-7548

Revision Record

24 June 2013 The JCMVP Implementation Guidance has been updated.
14 Feb. 2013 The JCMVP Implementation Guidance has been updated.
10 Nov. 2009 The reference to the ISO standards used in JCMVP has been made described precisely to specify the exact versions.
2 Nov. 2009 Requirements used in Cryptographic Module Testing are updated.
2 Nov. 2009 Assurance Continuity has been started in JCMVP.
30 Sep. 2009 Specifications of Cryptographic Algorithm Implementation Testing are updated.
3 Sep. 2009 The collection of forms is updated.
20 Aug. 2009 The JCMVP Implementation Guidance is updated.
1 Apr. 2009 Specifications of Cryptographic Algorithm Implementation Testing (English version) are made available.
2 June 2008 Page created