Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Guidance for content based image retrieval, i need advice regarding content...

i need advice regarding content based image retrieval project for my mtech thesis

Define historiography, Define Historiography: Historiography, the writing ...

Define Historiography: Historiography, the writing history, especially ,history which depend on the critical examination of sources, the selection of definite details from the au

Medieval art, Medieval Art: The medieval art of the Western world covers a...

Medieval Art: The medieval art of the Western world covers a huge scope of place and time, over 1000 years of art history in, the Middle East, Europe and North Africa. It involved

Applied behavior, For this week’s Learning Space Blog, start by looking at ...

For this week’s Learning Space Blog, start by looking at the table on page 461 of your Behavior Modification text. On your Blog, do your best to fill out this table for yourself,

What is gender?, What is Gender? Gender refers to the socially construc...

What is Gender? Gender refers to the socially constructed differences and relations between males and females. These vary widely among societies and cultures and change over ti

Global change, Global change: Global change refers to planetary-scale chan...

Global change: Global change refers to planetary-scale changes in the Earth system. The system consists of the land, oceans, atmosphere, poles, life, the planet's natural cycles a

Radio interviews, Problem 1 In what ways can radio be a better medium f...

Problem 1 In what ways can radio be a better medium for transmitting messages to an audience? Problem 2 (a) Explain three different types of radio interviews and illust

Database systems, coverting conceptual database tables into correspoding ta...

coverting conceptual database tables into correspoding tables

Applicability of Factory Act 1948, As">http://www.delhi.gov.in/wps/wcm/conn...

As">http://www.delhi.gov.in/wps/wcm/connect/doit_labour/Labour/Home/Acts+Implemented/Summary+of+the+Acts+Implemented/The+Factories+Act-1948 As per above site of Government of Ind

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd