Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Can i be an accountant when doing these subjects, Can I be an accountant wh...

Can I be an accountant when doing these subjects? math lit,business studies,accounting and computer

History of political ideas, History of Political Ideas: Systematic politic...

History of Political Ideas: Systematic political thinking goes back to very old philosophy. Because antiquity, scholars have reflected on political concepts, actors and institutio

Sociology, Malcolm X Which is the in-group, and what are the unifying value...

Malcolm X Which is the in-group, and what are the unifying values or the ascribed status that provides its solidarity

#title. Organizational behaviour, how would you examine if there is any mer...

how would you examine if there is any meriyt in the remarks of various fuctional managers

Native title and property law - research assignment, The research assignmen...

The research assignment aims to enable students to practice, develop and demonstrate their research and legal analysis skills. These skills will become more highly tuned throughout

Government and public affairs, For this task, complete the following: Choo...

For this task, complete the following: Choose an example of how the government has impacted public policy. For example: Social Security Act, the Affordable Care Act, the 18th Amen

#ti, development of a dynamic online shopping system

development of a dynamic online shopping system

Types of communication networks, (a) Communication in the business organiza...

(a) Communication in the business organization is very important but to structure it through appropriate networks is even more vital as unregulated communication flow could make i

What''s audience analysis?, Question 1 What are the indicators of Excellen...

Question 1 What are the indicators of Excellence in Technical Communication? Question 2 What's Audience Analysis? Explain its significance in Technical Communication

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd