Forms for Rules for the Application Procedures for Cryptographic Module Validation Form 1 Application for Cryptographic Module Validation To Chairman of the Information-technology Promotion Agency, Japan (IPA) The applicant hereby applies for the validation of the following cryptographic module in accordance with the “Rules for the Application Procedures for Cryptographic Module Validation” (CBM-02), and I, as the person in charge of this application, hereby agree to the contents of the Letter of Consent (Form 2) attached hereto. Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: <Type of application> Validation (new) of a cryptographic module/Revalidation of the cryptographic module with the validation number of ( ) <Identity of the cryptographic module to be shown in the “Validated Cryptographic Module Products List”> Name of the cryptographic module: Hardware version: Firmware version: Software version: Outline: <Person in charge of this application> Name (department/division): E-mail: Telephone number: The section below is to be filled out by the IPA. Reception number <Desired scope of validation> Security Level: 1 / 2 / 3 / 4 Physical state: Single-chip/Multi-chip embedded/Multi-chip standalone Note: Only “multi-chip standalone” is applicable to software. <Security/Testing Requirements that constitute standards for this cryptographic module validation> Name of the standard: <Information on the applicant to be shown in the “Validated Cryptographic Module Products List”> Name of the applicant: URL: Address: Contact person (department/division): E-mail of the contact person: Telephone number: Facsimile number: <Payer of application fee whom the bill is to be sent to> Name: Address: Attention (care of): E-mail: Telephone number: Facsimile number: <Information on the Cryptographic Module Testing Laboratory > Name of the Testing Laboratory: Person in charge: E-mail: Telephone number: Facsimile number: <Publicity of the status of “validation pending”> Does the applicant wish for the IPA to publicize the status of “validation pending” for its cryptographic module? Yes/No Form 2 Letter of Consent To Chairman of the Information-technology Promotion Agency, Japan (IPA) I, as the person in charge of application, hereby consent to the following pledges that the applicant takes. 1. The applicant will observe at all times the “Basic Rules for the Japan Cryptographic Module Validation Program” (hereinafter referred to as the “JCM-01”) and the “Rules for the Application Procedures for Cryptographic Module Validation” (hereinafter referred to as the “CBM-02”) established by the Information-technology Promotion Agency, Japan (IPA). 2. The applicant will make all preparations necessary for the fulfillment of the validation services by the IPA as the cryptographic module certification body (hereinafter referred to as the “Certification Body”), where such preparations include the arrangement of the cryptographic module needed for surveillance or retesting and access to the applicant’s documents, facilities, records or persons for inspection or interview. 3. The applicant will not use the cryptographic module validation for any other purposes than to show evidence of the certified conformity of the cryptographic module concerned to the Cryptographic Module Security Requirements mentioned in the Annex A of the JCM-01. 4. The applicant will explicitly indicate that the validation covers the designated scope only. 5. The applicant will not abuse the “Cryptographic Algorithm Verification Certificate,” “Cryptographic Module Validation Certificate,” “Cryptographic Module Validation Report” or “Validated Cryptographic Module Label” in a way that harms the reliability of the validation. 6. The applicant will not abuse, entirely or partially, the “Cryptographic Algorithm Verification Certificate,” “Cryptographic Module Validation Certificate” or “Cryptographic Module Validation Report” in a way that could induce any misunderstanding of facts. 7. When the applicant uses the “Validated Cryptographic Module Label” in a document, brochure, advertisement/publicity material, product package, etc., following the issue of the “Cryptographic Module Validation Certificate,” the applicant will have the Label accompanied with the below-mentioned explanation together with the cryptographic module validation number and the description of the attained security level, closely to each other or in a way that allows readers to identify them easily, and the applicant will not use the Label in a way that could induce any misunderstanding of facts. (In the case that the cryptographic module constitutes the entire portion of a product) “The validation granted for this cryptographic module is evidence of its conformity to the designated requirements under the Japan Cryptographic Module Validation Program (JCMVP) as proven by a test duly conducted on a sample of the module.” (In the case that the cryptographic module partially constitutes a product) “A validated cryptographic module is embedded in this product. The validation granted for this cryptographic module is evidence of its conformity to the designated requirements under the Japan Cryptographic Module Validation Program (JCMVP) as proven by a test duly conducted on a sample of the module.” 8. In the event that the validation is suspended or withdrawn, the applicant will immediately discontinue all advertisement and publicity activities that refer to the validation, and will return the “Cryptographic Module Validation Certificate” and any other documents granted upon the validation by following the instruction of the Certification Body. 9. Following the issue of the “Cryptographic Module Validation Certificate” for the applicant, the applicant will fulfill all of the below-mentioned obligations and requirements imposed on Applicants with Validation. a) When the applicant desires to supply or market the cryptographic module concerned in a way that explicitly shows their status of validated cryptographic module, the module must be supplied or marketed under the exact condition defined in the “Cryptographic Module Validation Report” and the “Cryptographic Module Validation Certificate” granted for the module. In the event that any modification has been made to the module, such modified cryptographic module may not be marketed unless revalidation or newly-applied validation is granted for the modified one. b) When any description in the “Cryptographic Module Validation Certificate” or “Validated Cryptographic Module Products List” has to be changed, the applicant must promptly notify the Certification Body of the change. c) The applicant must make records of all complaints given about the security of its validated cryptographic module. The applicant must deal with all such complaints in an appropriate manner and make records of all measures taken for addressing the complaints. The applicant is to submit to the Certification Body, when requested, a record of such complaint or any measure taken to address the complaint. In the case that the applicant is unable to submit such record for some reason, the applicant must allow the Certification Body’s personnel access to the record. d) When the applicant obtains any information that shows possible nonconformity of the validated cryptographic module to the JCMVP, the applicant must notify the Certification Body of such information without delay. If the applicant desires to maintain the validity of the cryptographic module, the applicant must obey any instruction given by the Certification Body in response to said notification. Such instruction might demand, for instance, the arrangement of retesting to be conducted by the Testing Laboratory or the payment of all retesting expenses in the case that there is a fault of the applicant. 10. The applicant will not claim any liability of the IPA for any damage, loss, etc. unless such damage, loss, etc. is attributable to any intentional grant of wrong validation by the IPA or any material fault of the IPA in its validation services. Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 3 Cryptographic Module Test Plan Issued on: date Reference number: To: <Applicant> From: < Testing Laboratory> Person in charge: < This is to inform that our test plan for your cryptographic module is as follows: <Information on the cryptographic module to be tested> Name of the cryptographic module: Hardware version: Firmware version: Software version: <Information on the Testing Laboratory who will conduct the test> Name of the Testing Laboratory: Person in charge: E-mail: Telephone number: Facsimile number: <Information on the team who will carry out the test> Quality Manager: Technical Manager: Team members: <Testing methods, techniques, tools and standards used for the test> > <Test schedule> Scheduled first day: Month/Day/Year The first week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: The ○th week ~ ○th week: <Note> Form 4 Notice of Change of Descriptions in Application for Cryptographic Module Validation, etc. To Chairman of the Information-technology Promotion Agency, Japan (IPA) This is to notify that the change mentioned below in 2. needs to be made to the descriptions on the application form categorized as below in 1. 1. Type of application Application for Cryptographic Module Validation Application for the Issue of English Version of Cryptographic Module Validation Certificate, etc. 2. Identity of the cryptographic module concerned Name of the module: Version: Date of application: Person in charge of the application: Content of the change: [Notes] - For section 1. above, the circled one applies. - The Person in Charge of Application shown herein is supposed to be the same person shown on the application form for cryptographic module validation. - Submission of this form is not necessary when the change is made to the description of the version only. Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 5 Notice of Withdrawal of the Application for Cryptographic Module Validation, etc. To Chairman of the Information-technology Promotion Agency, Japan (IPA) This is to notify that the applicant mentioned herein desires to withdraw the application categorized as below in 1. on the module and for the reason stated below in 2. 1. Type of application ・ Application for Cryptographic Module Validation ・ Application for the Issue of English Version of Cryptographic Module Validation Certificate, etc. 2. Identity of the cryptographic module concerned Name of the module: Version: Date of application: Reason of withdrawal: [Note] - For section 1. above, the circled one applies. - The Person in Charge of Application shown herein is supposed to be the same person shown on the application form for cryptographic module validation. Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 6 Notice of Change of Descriptions in Validated Cryptographic Module Products List, etc. To Chairman of the Information-technology Promotion Agency, Japan (IPA) This is to notify that the change mentioned below in 2. needs to be made to the descriptions on the document identified below in 1. 1. Category of the document ・ Validated Cryptographic Module Products List ・ Other ( ) 2. Identity of the cryptographic module concerned Name of the module: Cryptographic Module Validation number: Change to be made: Reason for making the change: [Notes] - For section 1. above, the circled one applies. - The Person in Charge of Application shown herein is supposed to be the same person shown on the application form for cryptographic module validation Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 7 Application for Reissue of Cryptographic Module Validation Certificate, etc.” To Chairman of the Information-technology Promotion Agency, Japan (IPA) The applicant hereby applies for the reissue of the document categorized as below in 1. for the reason mentioned below in 2. 1. Type of document ・ Cryptographic Algorithm Verification Certificate ・ Cryptographic Module Validation Certificate/Cryptographic Module Validation Report ・ English Version of Cryptographic Algorithm Verification Certificate ・ English Version of Cryptographic Module Validation Certificate/English Version of Cryptographic Module Validation Report Name of the module concerned: Version: Cryptographic Module Validation number or Cryptographic Algorithm Verification number: 2. Reason for the request for reissue [Notes] - For section 1. above, the circled one applies. - The Person in Charge of Application shown herein is supposed to be the same person shown on the application form for cryptographic module validation Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 8 Application for the Issue of English Version of Cryptographic Module Validation Certificate, etc. To Chairman of the Information-technology Promotion Agency, Japan (IPA) The applicant hereby applies for the issue of the “English Version of Cryptographic Algorithm Verification Certificate,” the “English Version of Cryptographic Module Validation Certificate” and the “English Version of Validation Report” that correspond to the following validation granted and issued in accordance with “Rules for the Application Procedures for Cryptographic Module Validation.” 1. Name of the cryptographic module concerned: 2. Date of the cryptographic module validation: 3. Cryptographic Module Validation number: Name of the Applicant: Address: Signature: Person in Charge of Application: Title: Date: Form 9 Nondisclosure Agreement This Nondisclosure Agreement (hereinafter referred to as the “Agreement”) is entered into by and between Name of the applicant (hereinafter referred to as the “Disclosing Party”) and the Information-technology Promotion Agency, Japan (hereinafter referred to as the “Receiving Party”) on the treatment of confidential information to be disclosed by the Disclosing Party to the Receiving Party as a consequence of the application made by the Disclosing Party for cryptographic module validation [Reception number of the application: ] and for the purpose of assisting the Receiving Party’s fulfillment of the cryptographic module validation services under the Japan Cryptographic Module Validation Program (hereinafter referred to as the “JCMVP”) and other works incidental to said services (hereinafter collectively referred to as the “Validation Services”) . The Parties agree as follows: on the following: (Aim of the Agreement) Article 1: This Agreement provides for the treatment of confidential information to be disclosed directly or via a testing laboratory by the Disclosing Party to the Receiving Party or to be obtained by the Receiving Party in the course of the Receiving Party’s fulfillment of the Validation Services. (Obligations of confidentiality) Article 2: The Receiving Party shall respect and preserve the confidentiality of the confidential information defined below (hereinafter referred to as the “Confidential Information”) with due care and in good faith, and shall not, without the prior written consent of the Disclosing Party, copy or disclose the Confidential Information to any third party. 2. The Confidential Information under this Agreement is defined as the technical or commercial information that is disclosed directly or via a testing laboratory by the Disclosing Party to the Receiving Party or the Receiving Party comes to know in the course of the fulfillment of the Validation Services, and shall include the following. (1) All tangible materials containing technical data or information, drawings and other relevant materials explicitly identified as confidential that have been delivered by the Disclosing Party to the Receiving Party or disclosed by the Disclosing Party to the Receiving Party by electromagnetic means as designated by the Receiving Party. (2) Information that is disclosed by the Disclosing Party to the Receiving Party orally or in a manner other than mentioned above along with the instruction to keep it confidential and is then explicitly designated as confidential by the Disclosing Party in writing within thirty days after the disclosure. 3. Without prejudice to the above provisions in 1 and 2 of this Article, any of the following information shall not be construed as the Confidential Information and therefore shall not bind the Receiving Party to the obligations of confidentiality. (1) Information that is publicly known at the time of disclosure from the Disclosing Party (2) Information that becomes publicly known after the disclosure from the Disclosing Party for any reason not attributable to the Receiving Party (3) Information that the Receiving Party already had in its possession or has received without restriction from an independent third party that is lawfully entitled to disclose the information to the Receiving Party prior to the disclosure by the Disclosing Party. (4) Information that the Receiving Party is authorized to disclose with the written consent of the Disclosing Party. 4. Paragraph 1 of this Article shall not apply to the cases mentioned below, provided however that the Receiving Party notifies the Disclosing Party of the disclosure to be made as mentioned below. (1) Where the Receiving Party is required by law to disclose any Confidential Information to such party as legally designated within such scope as legally specified (2) Where the Receiving Party sees any good reason to disclose any Confidential Information, with such reason including the government’s order, and obtains prior consent of the Disclosing Party to such disclosure of Confidential Information. 5. Even when the Confidential Information is copied, modified or compiled, the Receiving Party shall treat such copied, modified or compiled information as the Confidential Information under this Agreement. (Restricted use of the Confidential Information) Article 3: The Receiving Party shall not, without the prior written consent of the Disclosing Party use the Confidential Information for any other purpose than the fulfillment of the Validation Services. (Indemnification) Article 4: Receiving Party shall indemnify the Disclosing Party against any loss or damage incurred as a result of the Receiving Party’s breach of any provision of this Agreement as the Receiving Party should have foreseen such outcome in general, except that the Receiving Party shall not be responsible for compensating for any extraordinary loss or lost earnings. (Expenses of the preparation of this Agreement) Article 5: Costs generated as a result of preparing this Agreement shall be shared by both Parties in a way that respective Parties bear their own expenses. (Modification of this Agreement) Article 6: Any modification of this Agreement shall not be valid unless explicitly documented and signed by duly authorized representatives or legal attorneys of the respective Parties. (Entire agreement) Article 7: This Agreement sets forth the entire agreement between the Parties hereto as of the date of agreement specified herein and merges and supersedes all prior agreements, presentations, proposals, correspondences and understandings, oral or written, of any nature between them on the subject matter of this Agreement. In the event that any inconsistency is found between this Agreement and any of the said prior agreements, etc., this Agreement shall precede the latter. (Prohibited transfer of the rights, obligations, etc. under this Agreement) Article 8: Either Party may not transfer to any third party or allow any third party to succeed any rights, obligations and granted status under this Agreement, without the prior written consent of the other Party. (Term) Article 9: This Article shall become effective on the date of signature specified herein and shall expire after five years from the completion, suspension or termination of the Validation Service or after five years since the last day of the Receiving Party’s reception of the Confidential Information from the Disclosing Party, whichever comes first, unless otherwise agreed by both Parties separately from this Agreement. (Applicable law) Article 10: This Agreement and all rights and obligations of the Parties under this Agreement shall be construed and governed in accordance with the laws of Japan. (Jurisdiction) Article 11: Any dispute arising from this Agreement shall be brought in the Tokyo District Court as the court of first instance agreed upon between both Parties. IN WITNESS WHEREOF, the Parties hereto have executed this Agreement in two signed copies, with each to be kept by the Disclosing Party and the Receiving Party respectively. Disclosing Party Address Information-technology Promotion Agency, Japan 16F, Bunkyo Green Court Center Office 2-28-8 Honkomagome Bunkyo-ku, Tokyo, Japan 113-6591 By: By: ------------------------------------------------- ------------------------------------------------- Name: Name: ------------------------------------------------- ------------------------------------------------- Title: Title: Chairman ------------------------------------------------- ------------------------------------------------- Date: Date: ------------------------------------------------- ------------------------------------------------- Signature Signature ------------------------------------------------- ------------------------------------------------- Form 10 Cryptographic Module Observation Report Reference number Name of the XX cryptographic module cryptographic module Version Hardware version XXX Software version XXX Subject in question “Source code XX” Finding The function XX is not able to XXXXX. AS concerned TE concerned Report issued by: XX Testing Laboratory Writer of this Report Person in charge of the issue of this Report Date of issue Month/Day/Year Comments: The function XX described in the Xth line of the source code is not able to XXXXX, thus is found to fail to conform to the TE Requirement XXXX that demands “the source code is able to XXXX.” Your correction of this failure (nonconformity) is needed. This report goes to: (Name of the corporation who receives this Report.) The recipient of this (Month/Day/Year) Report is asked to respond by: Responded by: (Name of the corporation who responded to the Report) Writer of the response Person in charge of the response Date of response Month/Day/Year Comments: We’ve revised the function XX described in the Xth line of the Source Code XX to attain conformity with the TE Requirement XXX that demands that “the source code is able to XXXX,” by introducing the software version ○.○.○+1. Please review and confirm the conformity. Response goes to: (Name of the Testing Laboratory) Testing Laboratory Month/Day/Year is asked to review the response by: Reviewed by: (Name of the Testing Laboratory) Writer of this review report: Person in charge of the review Date of review Month/Day/Year Comments: As a result of reviewing the source code XX of the software version ○.○.○+1, we have confirmed a successful revision and conformity to the designated requirements. To be further NA reviewed by: Further review Not necessary