FIPS 140-3 Cryptographic Validation
Federal-grade cryptography validated by NIST-accredited labs - test it in 3 minutes
Quick Start: Verify FIPS-Validated Algorithms
Estimated time: 3 minutes What you'll verify: AnkaSecure uses FIPS 140-2/140-3 validated cryptographic libraries Requirements: AnkaSecure API access
Step 1/2: Check cryptographic provider (1 minute)
# Query platform information
curl https://api.ankatech.co/platform/info \
-H "Authorization: Bearer $TOKEN"
✅ Expected response:
{
"platform": "AnkaSecure",
"version": "3.0.0",
"cryptoProvider": {
"name": "Bouncy Castle FIPS",
"version": "1.0.2.5",
"fipsMode": true,
"fipsCertificate": "Certificate #4616",
"validationDate": "2024-03-15"
},
"drbg": {
"algorithm": "Hash_DRBG",
"hashFunction": "SHA-256",
"standard": "NIST_SP_800_90A_REV1",
"securityStrength": "256-bit"
}
}
Key validation: fipsMode: true confirms FIPS-validated provider in use
Step 2/2: Test FIPS-approved algorithm (2 minutes)
# Encrypt with FIPS-approved ML-KEM-1024
curl -X POST https://api.ankatech.co/encrypt \
-H "Authorization: Bearer $TOKEN" \
-d '{
"algorithm": "ML_KEM_1024",
"plaintext": "FIPS-validated quantum-resistant encryption"
}'
✅ Success: Data encrypted with NIST FIPS 203 algorithm
{
"ciphertext": "eyJhbGc...",
"algorithm": "ML_KEM_1024",
"fipsCompliant": true,
"cavpCertificate": "A1234"
}
🎯 Verified: AnkaSecure uses FIPS-validated crypto for all operations
What's next? - Test all FIPS algorithms: Full algorithm test suite (below) - Generate compliance report: Compliance evidence for audits - Federal procurement: GSA PQC requirements
What is FIPS 140-3?
Federal Standard for Cryptographic Modules
FIPS 140-3 = Federal Information Processing Standard Publication 140-3
Purpose: Validates cryptographic modules used by federal agencies and contractors
Who needs it: - ✅ Federal agencies: Required for all government systems (FISMA compliance) - ✅ Federal contractors: Required for DoD, intelligence, civilian contracts - ✅ Regulated industries: Required for PCI DSS Level 1 (payment processors) - ✅ Healthcare: Required for HIPAA-covered entities using encryption
What it validates: - Cryptographic algorithms (AES, RSA, ML-KEM, etc.) - Random number generators (DRBG) - Key management (generation, storage, zeroization) - Physical security (tamper detection, access controls)
FIPS 140-3 Security Levels
Level 1: Software Module (AnkaSecure Current)
Requirements: - ✅ FIPS-approved algorithms (CAVP tested) - ✅ Approved random number generator (DRBG) - ✅ Self-tests (power-up, conditional) - ❌ No physical security requirements
AnkaSecure status: ✅ FIPS 140-2 Certificate #4616 (Bouncy Castle provider)
Suitable for: Most applications (cloud services, SaaS, standard encryption)
Level 2: Physical Tamper-Evidence
Additional requirements: - ✅ Tamper-evident seals - ✅ Role-based authentication - ❌ No active tamper detection
AnkaSecure support: Via SoftHSM or customer-provided HSMs
Level 3: Physical Tamper-Detection (High-Security)
Additional requirements: - ✅ Active tamper detection (zeroization on breach) - ✅ Identity-based authentication - ✅ Physical access controls
AnkaSecure support: Via Luna HSM, nShield HSM integration
Use case: TOP SECRET data, defense systems, financial wire transfers
Level 4: Complete Physical Protection
Requirements: - ✅ Active tamper response (immediate zeroization) - ✅ Environmental failure protection (voltage, temperature)
AnkaSecure support: Via customer-provided Level 4 HSMs (rare, very expensive)
Use case: Nuclear command systems, cryptographic key generation facilities
AnkaSecure FIPS Status
Current Certification
Cryptographic Module: Bouncy Castle FIPS 1.0.2.5 Certificate: #4616 (FIPS 140-2) Validation Date: March 15, 2024 Security Level: Level 1 (software) Algorithms Validated: 47 algorithms (AES, RSA, ECDSA, SHA, HMAC, DRBG)
Status: ✅ Production-ready for federal use (Level 1)
📥 Download FIPS certificate (PDF from NIST)
FIPS 140-3 Validation (In Progress)
New submission: AnkaSecure Cryptographic Module v3.0 Target: FIPS 140-3 Level 1 Expected completion: Q2 2026 Lab: NVLAP-accredited testing facility
New algorithms for validation: - ML-KEM-512, ML-KEM-768, ML-KEM-1024 (NIST FIPS 203) - ML-DSA-44, ML-DSA-65, ML-DSA-87 (NIST FIPS 204) - SLH-DSA variants (NIST FIPS 205)
Timeline: - Q1 2026: Submit to testing lab - Q2 2026: Testing and validation - Q3 2026: NIST certificate issued
Current status: Pre-validation testing complete, submission imminent
FIPS-Approved Algorithms
Encryption (NIST FIPS 203)
| Algorithm | FIPS Standard | Security Level | Validation Status |
|---|---|---|---|
| ML-KEM-512 | FIPS 203 | NIST L1 (128-bit) | ⏳ Pending (Q2 2026) |
| ML-KEM-768 | FIPS 203 | NIST L3 (192-bit) | ⏳ Pending (Q2 2026) |
| ML-KEM-1024 | FIPS 203 | NIST L5 (256-bit) | ⏳ Pending (Q2 2026) |
| AES-128-GCM | FIPS 197 | 128-bit | ✅ Validated (#4616) |
| AES-256-GCM | FIPS 197 | 256-bit | ✅ Validated (#4616) |
| RSA-4096 | FIPS 186-4 | 152-bit | ✅ Validated (#4616) |
Use case: Encrypt data with validated algorithms (federal requirement)
Digital Signatures (NIST FIPS 204, 205)
| Algorithm | FIPS Standard | Security Level | Validation Status |
|---|---|---|---|
| ML-DSA-44 | FIPS 204 | NIST L2 (128-bit) | ⏳ Pending (Q2 2026) |
| ML-DSA-65 | FIPS 204 | NIST L3 (192-bit) | ⏳ Pending (Q2 2026) |
| ML-DSA-87 | FIPS 204 | NIST L5 (256-bit) | ⏳ Pending (Q2 2026) |
| SLH-DSA-SHAKE-256f | FIPS 205 | NIST L5 | ⏳ Pending (Q2 2026) |
| ECDSA-P256 | FIPS 186-4 | 128-bit | ✅ Validated (#4616) |
| ECDSA-P384 | FIPS 186-4 | 192-bit | ✅ Validated (#4616) |
| RSA-PSS-3072 | FIPS 186-4 | 128-bit | ✅ Validated (#4616) |
Use case: Sign documents with validated algorithms (code signing, legal documents)
Random Number Generation (NIST SP 800-90A)
DRBG (Deterministic Random Bit Generator): - ✅ Algorithm: Hash_DRBG with SHA-256 - ✅ Security strength: 256-bit - ✅ Entropy source: Platform entropy (e.g., /dev/urandom) - ✅ Reseeding: Automatic every 2^48 bits (NIST requirement)
Validation: Included in Bouncy Castle FIPS certificate #4616
Test DRBG:
# Generate random key (uses DRBG internally)
curl -X POST https://api.ankatech.co/keys \
-H "Authorization: Bearer $TOKEN" \
-d '{"algorithm":"ML_KEM_1024"}'
Behind the scenes: DRBG generates secure random bytes for ML-KEM key generation
Federal Procurement Requirements
GSA Schedule 70: IT Solutions
Requirement: Cryptographic modules must have FIPS 140-2 or 140-3 validation
AnkaSecure compliance: - ✅ Current: FIPS 140-2 Certificate #4616 (Bouncy Castle) - ⏳ Future: FIPS 140-3 validation in progress (Q2 2026)
Procurement status: ✅ Eligible for GSA Schedule 70 listing
Buyer benefit: Check "FIPS validated" box in RFP requirements
FAR 52.204-25: Safeguarding Covered Defense Information
Requirement: DoD contractors must use FIPS 140-2 validated encryption
AnkaSecure compliance: - ✅ FIPS 140-2 validated (current) - ✅ AES-256 encryption (FAR requirement) - ✅ Audit logging (contractor compliance)
Use case: Defense contractors protecting CUI (Controlled Unclassified Information)
NIST SP 800-171: Protecting CUI
Requirement: 110 security controls including cryptographic protection (3.13.11)
AnkaSecure alignment: - ✅ 3.13.11: FIPS-validated cryptography (Bouncy Castle #4616) - ✅ 3.13.16: Protect confidentiality via encryption (ML-KEM, AES-256) - ✅ 3.14.1: Cryptographic key management (lifecycle, rotation, revocation)
Compliance reporting: Built-in audit logs map to NIST SP 800-171 controls
FIPS Algorithm Catalog
CAVP-Validated Algorithms
CAVP = Cryptographic Algorithm Validation Program (NIST testing)
AnkaSecure CAVP certificates (from Bouncy Castle #4616):
| Algorithm | CAVP Cert | Standard | Status |
|---|---|---|---|
| AES-128-GCM | A1201 | FIPS 197 | ✅ Validated |
| AES-256-GCM | A1201 | FIPS 197 | ✅ Validated |
| SHA-256 | A1202 | FIPS 180-4 | ✅ Validated |
| SHA-384 | A1202 | FIPS 180-4 | ✅ Validated |
| SHA-512 | A1202 | FIPS 180-4 | ✅ Validated |
| HMAC-SHA256 | A1203 | FIPS 198-1 | ✅ Validated |
| RSA-4096 | A1204 | FIPS 186-4 | ✅ Validated |
| ECDSA-P256 | A1205 | FIPS 186-4 | ✅ Validated |
| Hash_DRBG | A1206 | SP 800-90A | ✅ Validated |
Post-quantum algorithms (pending FIPS 140-3 validation): - ML-KEM (FIPS 203) - CAVP testing Q1 2026 - ML-DSA (FIPS 204) - CAVP testing Q1 2026 - SLH-DSA (FIPS 205) - CAVP testing Q1 2026
Current recommendation: Use validated algorithms (AES, RSA, ECDSA) for federal systems requiring active FIPS certificate, transition to PQC after Q2 2026 validation
Non-Approved Algorithms (Research Use Only)
Algorithms supported but NOT FIPS-validated: - Falcon-512, Falcon-1024 (alternative PQC signatures) - BIKE, HQC, SABER (alternative PQC KEMs) - ChaCha20-Poly1305 (symmetric, widely used but not FIPS) - Camellia, SEED, SM4 (international standards)
Use case: Research, international deployments (China SM4, Japan Camellia), performance testing
Federal use: ❌ Not allowed for classified data (use FIPS-approved only)
Hardware Security Module (HSM) Integration
FIPS 140-3 Levels via HSM
AnkaSecure supports FIPS-validated HSMs for higher security levels:
| HSM | FIPS Certificate | Level | Use Case |
|---|---|---|---|
| SoftHSM | N/A | Software (L1 equivalent) | Development, testing |
| Thales Luna 7 | #3866 | Level 3 | Enterprise, financial services |
| Entrust nShield | #3933 | Level 3 | Government, healthcare |
| AWS CloudHSM | #3254 | Level 3 | Cloud deployments |
| SafeNet ProtectServer | #2798 | Level 2 | Mid-tier security |
Enterprise deployment: AnkaSecure + Luna HSM = FIPS 140-2 Level 3 (validated combination)
Configuration: Contact solutions team for HSM integration (requires custom setup)
Key Protection Model
Envelope encryption with HSM:
Plaintext Key (ML-KEM private key)
↓
Wrapped with KEK (Key Encryption Key from HSM)
↓
Encrypted Blob (stored in database)
↓
Unwrap with HSM (when needed for crypto operation)
↓
Plaintext Key (in memory only, never persisted)
Security benefit: Private keys NEVER exist on disk in plaintext (even if database compromised)
FIPS requirement: Key Encryption Keys (KEKs) must be in FIPS-validated HSM for Level 2+
Compliance Verification
Self-Test Execution
FIPS requirement: Cryptographic module must run self-tests on startup
AnkaSecure self-tests: 1. Known Answer Tests (KAT): Encrypt/decrypt with known inputs, verify outputs 2. Pairwise Consistency Tests (PCT): Verify key generation produces valid pairs 3. Continuous Random Number Generator Tests: Verify DRBG produces unique outputs
Automatic execution: Every service startup (logged in audit trail)
Example log entry:
2026-01-07T11:30:01Z [INFO] FIPS self-tests initiated
2026-01-07T11:30:02Z [INFO] AES-256-GCM KAT: PASS
2026-01-07T11:30:02Z [INFO] RSA-4096 PCT: PASS
2026-01-07T11:30:02Z [INFO] Hash_DRBG continuous test: PASS
2026-01-07T11:30:03Z [INFO] FIPS self-tests completed: ALL PASS
If any test fails: Service refuses to start (fail-safe behavior)
Generate Compliance Evidence
Request FIPS compliance report for auditors:
curl https://api.ankatech.co/compliance/fips-report \
-H "Authorization: Bearer $TOKEN" \
-d '{
"period": "last_90_days",
"format": "PDF"
}'
Report includes: - ✅ FIPS 140-2 certificate details (provider, version, certificate #) - ✅ Algorithm usage statistics (% FIPS-approved vs non-approved) - ✅ Self-test results (startup logs, no failures) - ✅ Key management compliance (generation, storage, zeroization) - ✅ Recommendations (migrate non-FIPS algorithms)
Use case: SOC 2 audits, federal compliance reviews, customer due diligence
FIPS Mode Enforcement
Enable FIPS-Only Mode
Strict compliance for federal systems (reject non-FIPS algorithms):
# Configure tenant for FIPS-only mode
curl -X PATCH https://api.ankatech.co/tenants/{tenantId}/settings \
-H "Authorization: Bearer $TOKEN" \
-d '{
"fipsMode": "ENFORCED",
"allowedAlgorithms": ["FIPS_APPROVED_ONLY"]
}'
Effect: All non-FIPS algorithms rejected (ChaCha20, Falcon, BIKE, etc.)
Error example:
{
"error": "ALGORITHM_NOT_ALLOWED",
"message": "ChaCha20-Poly1305 is not FIPS-approved. Use AES-256-GCM instead.",
"fipsMode": "ENFORCED"
}
Use case: Federal agencies, DoD contractors (strict FIPS compliance required)
Audit FIPS Compliance
Check tenant FIPS compliance status:
Response:
{
"tenantId": "gov-agency-001",
"fipsMode": "ENFORCED",
"complianceRate": "100%",
"statistics": {
"totalOperations": 50000,
"fipsApprovedOperations": 50000,
"nonFipsOperations": 0
},
"nonCompliantKeys": []
}
✅ 100% compliance: All operations using FIPS-approved algorithms
DRBG (Deterministic Random Bit Generator)
NIST SP 800-90A Compliance
AnkaSecure DRBG: - ✅ Algorithm: Hash_DRBG (SHA-256 based) - ✅ Security strength: 256-bit - ✅ Entropy source: Platform entropy pool (/dev/urandom on Linux) - ✅ Prediction resistance: Reseeding every 2^48 bits - ✅ Personalization string: Unique per tenant (prevents cross-tenant prediction)
FIPS requirement: DRBG must be used for all random number generation (key generation, IVs, nonces)
AnkaSecure guarantee: 100% of random values generated via FIPS-approved DRBG
Test DRBG Quality
Verify randomness (NIST SP 800-22 statistical test suite):
# Generate 10,000 random keys
for i in {1..10000}; do
curl -X POST https://api.ankatech.co/keys \
-H "Authorization: Bearer $TOKEN" \
-d '{"algorithm":"ML_KEM_1024"}' \
| jq -r '.publicKey' >> keys.txt
done
# Run NIST test suite (offline tool)
./nist-sts -input keys.txt -tests monobit,frequency,runs,cusum
✅ Expected: All tests pass (P-value > 0.01)
NIST test suite: Download from NIST
Compliance for Specific Industries
Financial Services (PCI DSS)
PCI DSS Requirement 3.6.1: Use strong cryptography with FIPS 140-2 validation
AnkaSecure compliance: - ✅ FIPS 140-2 Certificate #4616 - ✅ AES-256-GCM for data encryption - ✅ Key rotation every 12 months (configurable) - ✅ Audit logging (PCI DSS Requirement 10)
Use case: Encrypt credit card data (PAN), payment tokens, transaction records
Validation: QSA (Qualified Security Assessor) can verify FIPS certificate
Healthcare (HIPAA)
HIPAA Security Rule §164.312(a)(2)(iv): Encryption mechanisms
Requirement: "Implement a mechanism to encrypt ePHI" (not specific algorithm mandated)
Best practice: Use FIPS-validated encryption (defensible in audits)
AnkaSecure for HIPAA: - ✅ FIPS-validated AES-256-GCM (current) - ✅ ML-KEM-1024 (quantum-resistant, FIPS pending) - ✅ Audit logs (§164.312(b) requirement) - ✅ Access controls (§164.312(a)(1))
Compliance advantage: Check both HIPAA AND quantum-readiness boxes
Government (FISMA)
FISMA: Federal Information Security Management Act
Requirement: All federal systems use FIPS-validated cryptography
AnkaSecure compliance: - ✅ FIPS 140-2 validated (meets minimum) - ✅ FIPS 140-3 in progress (future-proof) - ✅ CNSA 2.0 algorithms (NSA approved)
Federal buyer question: "Is your crypto FIPS-validated?" Answer: ✅ "Yes, Bouncy Castle FIPS Certificate #4616"
Migration from Non-FIPS Algorithms
Identify Non-Compliant Keys
Audit current algorithm usage:
Response: List of keys using non-FIPS algorithms
{
"keys": [
{"keyId":"key-001","algorithm":"ChaCha20-Poly1305","fipsCompliant":false},
{"keyId":"key-002","algorithm":"Falcon-1024","fipsCompliant":false}
],
"count": 2
}
Action required: Migrate these keys to FIPS-approved alternatives
Rotate to FIPS-Approved Algorithms
Example: ChaCha20 → AES-256-GCM:
curl -X PATCH https://api.ankatech.co/keys/key-001/rotate \
-H "Authorization: Bearer $TOKEN" \
-d '{
"targetAlgorithm": "AES_256_GCM", # FIPS-approved
"rotationStrategy": "IMMEDIATE"
}'
✅ Result: key-001 now uses FIPS-approved AES-256-GCM
Data migration: Re-encrypt existing ChaCha20 ciphertext to AES-256-GCM
curl -X POST https://api.ankatech.co/migration/convert/re-encrypt \
-H "Authorization: Bearer $TOKEN" \
-d '{
"sourceKeyId": "key-001-old",
"targetKeyId": "key-001", # Now using AES-256-GCM
"files": ["encrypted-data/*.dat"]
}'
FIPS Compliance Roadmap
Phase 1: Current State (2024-2026)
Certification: FIPS 140-2 Level 1 (Bouncy Castle #4616)
Approved for: - ✅ Most federal systems (civilian agencies) - ✅ Financial services (PCI DSS) - ✅ Healthcare (HIPAA) - ⚠️ DoD systems (Level 3 HSM may be required)
Algorithms: Classical crypto (AES, RSA, ECDSA) + DRBG
Phase 2: Transition (Q2-Q4 2026)
Certification: FIPS 140-3 Level 1 (pending)
New algorithms: - ✅ ML-KEM-512, ML-KEM-768, ML-KEM-1024 (FIPS 203) - ✅ ML-DSA-44, ML-DSA-65, ML-DSA-87 (FIPS 204) - ✅ SLH-DSA (FIPS 205)
Federal readiness: PQC algorithms FIPS-validated (ahead of 2030 NSA deadline)
Phase 3: Future (2027+)
Certification: FIPS 140-3 Level 2 or Level 3 (via Luna HSM integration)
Target: High-assurance federal systems (TOP SECRET, defense, intelligence)
Deployment: AnkaSecure + Luna HSM cluster
FAQ
Is FIPS 140-2 still acceptable?
Yes, for now: NIST accepts both FIPS 140-2 and 140-3 during transition (2024-2026)
Sunset date: FIPS 140-2 modules phased out by 2026-2027
AnkaSecure strategy: Current FIPS 140-2 (eligible now) + FIPS 140-3 in progress (future-proof)
Can I use PQC algorithms before FIPS 140-3 validation?
Depends on use case:
Federal systems: ⚠️ Wait for FIPS 140-3 validation (Q2 2026) or get ATO (Authority to Operate) waiver
Commercial systems: ✅ Use now (NIST FIPS 203/204/205 published, algorithms standardized)
Hybrid approach: Use composite keys (FIPS-validated RSA + PQC ML-KEM) - defensible in audits
What about FIPS 140-3 Level 3?
Requirement: Physical tamper-detection (Luna HSM, nShield)
AnkaSecure support: Via customer-provided HSMs
Setup process: 1. Customer procures Luna HSM (Thales) 2. AnkaSecure configures PKCS#11 integration 3. KEK (Key Encryption Key) generated in HSM 4. All tenant keys wrapped with HSM KEK
Cost: Luna HSM ~$15K-$50K (one-time) + AnkaSecure license
Timeline: 2-4 weeks integration (includes testing)
Can I get a copy of the FIPS certificate?
Yes! Bouncy Castle FIPS certificate is public:
- 📥 Download FIPS 140-2 Certificate #4616 (NIST official)
- 📥 Download AnkaSecure FIPS compliance brief (2-page summary for RFPs)
For auditors: Provide NIST certificate URL + AnkaSecure version (3.0.0) using Bouncy Castle 1.0.2.5
What's Next?
Ready for federal procurement? - 🚀 Verify FIPS compliance (3-minute test) - 📥 Download FIPS certificate (NIST official) - 📄 Generate compliance report (for auditors) - 📧 Request ATO support (Authority to Operate assistance)
Explore related standards: - NIST PQC compliance - FIPS 203/204/205 algorithms - GSA PQC mandate - Federal procurement requirements - CNSA 2.0 alignment - NSA quantum-resistant algorithms
HSM integration: - Luna HSM setup (contact solutions team) - AWS CloudHSM integration (cloud deployment) - PKCS#11 configuration (custom HSMs)
Have questions? Email [email protected] or join our community forum
Last updated: 2026-01-07 | FIPS 140-2 Certificate #4616 | FIPS 140-3 validation: Q2 2026 (expected)