An Overview of FIPS 140-3 Certification for Software-Based Cryptographic Products

Venkatesh Ramamoorthy

F5 Networks

Abstract

This discussion focuses on certification of network security products employing software-based cryptography to conform to NIST's FIPS 140-3 Level-1 and Level-2 standards. An introduction to such products and deployment scenarios is followed by a reasonably high-level introduction to cryptographic primitives. Certification at architectural and algorithmic levels are examined. A very short example of the nature of steps involved while certifying a cryptographic algorithm, such as RSA signature generation and verification algorithm, is examined. This will encourage students to implement several validations in cryptographic algorithms that are often found missing during certification. The discussion concludes with NIST's FIPS 140-3 directions on Post Quantum Computing algorithms.

About the Speaker

Dr. Venkatesh Ramamoorthy completed his Ph.D studies from Florida Institute of Technology in Summer 2010. He is currently employed with F5, Inc., San Jose, CA as Principal Engineer - Software, and has over 20 years of work experience in the conception, design, development, testing and deployment of cryptographic product suites. Most of his work has been at the level of implementing and testing cryptographic algorithms and integrating these into flagship products manufactured by information security organizations, employing Transport Layer Security (TLS) technologies. Dr. Ramamoorthy is currently involved in the certification of next-generation product suites in F5's BigIP product family to conform to the Federal Information Processing Standards (FIPS) 140-3 Levels 1 and 2 and Common Criteria.