The connection holds steady, even across oceans, even through spotty Wi‑Fi. Mosh makes that possible. But when security stakes rise, speed is not enough — cryptography must meet the highest standard. That’s where FIPS 140‑3 enters the frame.
FIPS 140‑3 is the latest U.S. government standard for cryptographic modules. It replaces 140‑2 and tightens the rules for encryption, key management, and entropy sources. Any network protocol that claims compliance needs every cryptographic component tested and validated. For Mosh — the mobile shell built to keep sessions alive over unreliable networks — this means its secure transport layer must run through FIPS‑approved algorithms, implemented in certified modules.
Mosh uses SSH to handle authentication and encryption before switching to its own UDP‑based protocol for data transfer. To align with FIPS 140‑3, the SSH stack must operate inside a FIPS‑validated cryptographic library. That includes ciphers like AES‑GCM and SHA‑256, random number generators, and even key derivation functions. Every call to encrypt or decrypt must come from a module with a certificate in the NIST CMVP database.