Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Cultural structures of indigenous people, Cultural Structures of Indigenous...

Cultural Structures of Indigenous People: Indigenous communities, peoples and nations are those which, having a historical continuity with pre-invasion and pre-colonial societies

Explain the remedies available under judicial review, QUESTION "It has ...

QUESTION "It has often been said that Judicial Review is the only mean to have judicial control over administrative actions." Discuss the validity of this statement. Expl

Digital electronics and microprocessor, Write a control word for counter 1 ...

Write a control word for counter 1 of 8253 / 8254 that selects the following options: load least significant byte only, mode 5 of operation and binary counting. Then write an instr

Ict, type of nature of software flowchart

type of nature of software flowchart

Car following behavior of driver - traffic congestion, Car Following Behavi...

Car Following Behavior of Driver - Traffic Congestion and Safety on the Road   Understanding car following contributes significantly to an understanding of traffic flow. Car

Internatonal business, need for documents in international business?give su...

need for documents in international business?give suitable exambles

Feedback mechanism in the context of climate, 1. What is a feedback mechani...

1. What is a feedback mechanism in the context of climate? 2. Provide and explain one example of a positive feedback that begins with air temperature. 3. Provide and explain

What are the drawbacks of a bureaucratic organisation, Question 1: (a) ...

Question 1: (a) Using examples from the Mauritian context, analyse the Dual Labour Market theory. (b) Distinguish between Liberal, Marxist and Radical Feminism. (c) Acco

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd