![]() The NIST Information Technology Laboratory operates a related program that validates the FIPS approved cryptographic algorithms in the module. The FIPS 140-2 security requirements cover 11 areas related to the design and implementation of a cryptographic module. It validates cryptographic modules against the Security Requirements for Cryptographic Modules (part of FIPS 140-2) and related FIPS cryptography standards. National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security (CCCS). The Cryptographic Module Validation Program (CMVP) is a joint effort of the U.S. It defines the minimum security requirements for cryptographic modules in IT products. FIPS is based on Section 5131 of the Information Technology Management Reform Act of 1996. The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. In this article FIPS 140-2 standard overview
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |