Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Farming, Most important effects on farming?

Most important effects on farming?

Clinical reasoning project, You will be presented with a three clinical pat...

You will be presented with a three clinical patient situations online via a digital story. Topics include; A diabetic patient A patient with COPD A patient requiring a

Benchmark - information governance, Need help with a 1500 word executive su...

Need help with a 1500 word executive summary that contains the following information: Overview of information governance framework

Explain john burton''s theory of decision-making, Question 1 How have both...

Question 1 How have both the World Wars and League of Nations affected international politics? Question 2 Define globalization. Also analyse Terrorism as a global threat

Gender roles in society: a global perspective, Gender Roles in Society: A G...

Gender Roles in Society: A Global Perspective: The role of a man and a woman in society is influenced by a variety of factors. These factors vary with the region, religion, cultur

History, Which of the following best describes how many Europeans, living t...

Which of the following best describes how many Europeans, living through the Great Depression, thought about political systems? a) All forms of governments are bad b) Liberalism is

Macros, Do you have experts writing macros in excel?

Do you have experts writing macros in excel?

Binary numbers in digital computers, discuss the elements in binary number...

discuss the elements in binary number in digital computers

Cultural anthropology, 1- Explain the role of theory in cultural anthropolo...

1- Explain the role of theory in cultural anthropology. 2- Distinguish theories from truths and explain why theories need critical review and modification 3- Explain with exa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd