Enhancing information security

Documents of this program

Release Date:Jun 2, 2008

Last Updated:Jul 1, 2023

Regulations

The regulations of JCMVP are listed in the following.

Rules and operational manuals are listed in the following. In these documents, terms in bold mean defined one, and terms in bold italic mean a related document.

(Note: Written in Japanese)

Rules

Manuals

Requirements used in Cryptographic Module Testing

The following ISO/IEC standards are published applicable in JCMVP.

ISO/IEC 19790:2012 was developed through discussions in ISO/IEC JTC1/SC27 based on a draft version of FIPS 140-3, and the corrected reprint version of ISO/IEC 19790:2012 was published in December 2015. Note that FIPS 140-3open new window was approved and issued on May 1st, 2019.

ISO/IEC 24759:2017 specifies testing requirements for demonstrating the conformity to the requirements specified in ISO/IEC 19790:2012 (Corrected version 2015-12-15), and was published in March 2017.

ISO/IEC standards associated with JCMVP

The following ISO/IEC standards are published which are associated with JCMVP.

  • ISO/IEC 19896-2:2018
  • Information technology — Security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers

ISO/IEC 19896-2:2018 specifies competence requirements such as knowledge and skills for cryptographic module testing and have been developed through discussions in ISO/IEC JTC1/SC27.

  • ISO/IEC 18367:2016
  • Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing

 ISO/IEC 18367:2016 gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods and have been developed through discussions in ISO/IEC JTC1/SC27. ISO/IEC 18367:2016 is based on the conformance testing methods employed in JCMVP and in CAVP

  • ISO/IEC 20543:2019
  • Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408

ISO/IEC 20543:2019 specifies a methodology for the evaluation of random bit generators intended to be used for cryptographic applications, and have been developed through discussions in ISO/IEC JTC1/SC27.

JCMVP Implementation Guidance

The following shows the guidance about operations in this program, and interpretations of security requirements for cryptographic modules and of Test requirements for cryptographic modules.

Target functions of Cryptographic Algorithm Implementation Testing

Requirements used in Cryptographic Algorithm Implementation Testing

The following documents specify detailed test requirements used in Cryptographic Algorithm Implementation Testing.

(Note: Written in Japanese)

JCMVP Cryptographic Algorithm Implementation Testing Requirements

Specifications of Cryptographic Algorithm Implementation Testing

Contact information

IT Security Center, Information-technology Promotion Agency, Japan

  • E-mail

    jcmvp-infoアットマークipa.go.jp

  • TEL

    +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)

  • FAX

    +81-3-5978-7548

Change log

  • Jul 1, 2023

    The old specifcation of Approved Security Functions, valid until June 30, 2023, is deleted.

  • Jan 20, 2023

    Documents of this program has been updated.

  • Dec 21, 2022

    Documents of this program has been updated.

  • Aug 22, 2022

    Requirements used in Cryptographic Module Testing have been updated.

  • Nov 11, 2020

    Operational Manual for Cryptographic Module Validation Services and Collection of Forms have been updated.

  • Nov 2, 2020

    On 1 November 2020, the revised Rules on JCM-01, CBM-01 and CBM-02 became effective.

  • Oct 20, 2020

    Documents of this program has been updated.

  • Nov 27, 2019

    The reference to ISO/IEC 20543 has been added.

  • Oct 8, 2019

    Documents of this program has been updated.

  • May 24, 2019

    Note about FIPS 140-3 was added.