HOME >> IT Security >> JCMVP >> Documents of this program

Documents of this program

Last modified : 14 Feb. 2013
Page created : 2 June 2008

Regulations

The regulations of JCMVP are listed in the following.

Rules and operational manuals are listed in the following. In these documents, terms in bold mean defined one, and terms in bold italic mean a related document.

  Certification Body Applicants Cryptographic Module Testing Laboratories
Rules (JCM-01) Basic Rules for the Japan Cryptographic Module Validation Program[PDF]
(CBM-01)
Rules for the Organization and Operation of the Cryptographic Module Certification Body[PDF]
(CBM-02)
Rules for the Application Procedures for Cryptographic Module Validation[PDF] (Collection of Forms[MS-Word])
(CBM-03)
Rules for the Application Procedures for Recognition as Cryptographic Module Testing Laboratories[PDF]
Manuals

(CBM-01-A)
Operational Manual for Cryptographic Module Validation Services[PDF]

(CBM-01-B)
Operational Manual for Recognition as Cryptographic Module Testing Laboratories[PDF]

(CBM-01-C)
Manual for Management of Personnel of the Cryptographic Module Certification Body[PDF]

   

Requirements used in Cryptographic Module Testing

In March 2006, ISO/IEC 19790:2006 was published, which defines security requirements for cryptographic modules. In July 2008, ISO/IEC 24759:2008 was published, which defines testing requirements for cryptographic modules.
In addition, IPA has approved security functions included in e-Government Recommended Ciphers List, etc. (e.g. cryptographic functions, hash functions and signature functions), and has established the testing requirements for approved security functions.
Requirements used in Cryptographic Module Testing are listed in the following.

MSR-01-EN and MTR-01-EN are based on FIPS PUB 140-2 and FIPS PUB 140-2 DTR respectively. New applications for Cryptographic Module Testing based on these requirements are accepted until March 31, 2010. After that day, only applications for Cryptographic Module Testing based on ISO/IEC 19790 and ISO/IEC 24759 are accepted.

Note: Cryptographic Module Testing includes Cryptographic Algorithm Implementation Testing.

JCMVP Implementation Guidance

The following shows the guidance about operations in this program, and interpretations of security requirements for cryptographic modules and of Test requirements for cryptographic modules.

Requirements used in
Cryptographic Algorithm Implementation Testing

Contact

For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
E-mail: E-mail address for JCMVP
TEL +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX +81-3-5978-7548

Revision Record

14 Feb. 2013 The JCMVP Implementation Guidance has been updated.
10 Nov. 2009 The reference to the ISO standards used in JCMVP has been made described precisely to specify the exact versions.
2 Nov. 2009 Requirements used in Cryptographic Module Testing have been updated.
2 Nov. 2009 Assurance Continuity has been started in JCMVP.
30 Sep. 2009 Specifications of Cryptographic Algorithm Implementation Testing have been updated.
3 Sep. 2009 The collection of forms has been updated.
20 Aug. 2009 The JCMVP Implementation Guidance has been updated.
1 Apr. 2009 Specifications of Cryptographic Algorithm Implementation Testing (English version) are made available.
2 June 2008 Page created