Research · NIST AI
Electronic device manufacturers should find it less time-consuming to bring their wares to both the U.S. and international markets
Compiled by KHAO Editorial — aggregated from 1 outlet. See llms.txt for citation guidance.
★ Tier-1 Source
Virtually all devices that receive and process electronic data—hardware used in laptops and cell phones as well as software that also exchanges information through networks—use some form of encryption to protect this data from prying eyes.
Key facts
- Like previous FIPS 140 versions, the first of which was created in 1982, FIPS 140-3 will be used primarily by laboratories that test new products’ encryption algorithms
- FIPS 140-3: Security Requirements for Cryptographic Modules specifies the requirements a device’s encryption system must meet if it is to be used by the federal government
- Announced today on the Federal Register, the newly released FIPS 140-3 modernizes the standard and makes the U.S. standard a “pointer” indicating that manufacturers should now use the international
- Any product that adheres to the international standard—known as ISO 19790 —will therefore use an encryption approach that is acceptable both within and outside the United States
Summary
Official websites use.gov A.gov website belongs to an official government organization in the United States. Secure.gov websites use HTTPS A lock or https:// means you’ve safely connected to the.gov website. Electronic device manufacturers should find it less time-consuming to bring their wares to both the U.S. and international markets because of new requirements issued by the National Institute of Standards and Technology (NIST), which has updated the Federal Information Processing Standard (FIPS) for testing the effectiveness of a device’s data encryption. Announced today on the Federal Register, the newly released FIPS 140-3 modernizes the standard and makes the U.S. standard a “pointer” indicating that manufacturers should now use the international standard, which NIST helped to develop.