Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Create a banner advertisement, You are to create a banner advertisement for...

You are to create a banner advertisement for the 20th annual Europe Music Awards to be held in the Ziggo Dome in Amsterdam on the 10th November 10, 2013. The advert should draw

Biomedical informatics, What is the utility of a linear model of patient ca...

What is the utility of a linear model of patient care as the basis for a decision-support system? What are two primary limitations? Discuss two challenges that a nonlinear model po

Assess and discuss the given statement, Problem 1: Assess and discuss ...

Problem 1: Assess and discuss the following statement. "The underlying principles of ethical codes are to prevent client harm, promote client autonomy, and ensure that clinic

Explain Psychopathology, What is Psychopathology? Please explain subject co...

What is Psychopathology? Please explain subject concern to?

Language Barrier, How do you overcome language barriers between Pakistan an...

How do you overcome language barriers between Pakistan and Norway?

Proof reading, How can I improve my summary? Over the years the company Joh...

How can I improve my summary? Over the years the company Johnson and Johnson has been recalling Tylenol products and taking them off the shelves since 1982. As of February 18, 2012

Anthropology, Provided an example of secondary social group.

Provided an example of secondary social group.

Education and society, mention the aims of education in present scenario

mention the aims of education in present scenario

Theory of mind, What is meant by a "theory of mind"? Note that the text ref...

What is meant by a "theory of mind"? Note that the text refers to research that shows that growing up with siblings positively influences the acquisition of a theory of mind. Specu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd