Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

FAMILY EDUCATION, ROLE OF PEERS IN IMPARTING FAMILY EDUCATIO

ROLE OF PEERS IN IMPARTING FAMILY EDUCATION

Home work, complete a home work questionnaire for parents

complete a home work questionnaire for parents

Discuss the gender issues in bereavement, Question: It is believed that...

Question: It is believed that the grief experience impacts all aspects of the being of an individual. Describe carefully any one of the following reactions which an individu

Theories of human communication, Theories of Human Communication: Human co...

Theories of Human Communication: Human communication occurs while one or more people send and receive messages. All of the communication acts have the following elements: sources,

Explain peters and watermans organizational model, Question: (a) Exami...

Question: (a) Examine the following sub-systems in so far as they enhance our understanding of the educational system: normative, strategic, operational and administrative. Su

Describe how two-hand control device work, Question 1: (a) In relation...

Question 1: (a) In relation to electrical safety, explain the meaning of the following terms: (i) Earthing (ii) reduced low voltage (iii) isolation (iv) over curre

Briefly explain what is e-trading, Question: a) In the context of e-b...

Question: a) In the context of e-banking or e-commerce, outline some of the risks associated with informational websites and transactional websites. b) In addition to tr

Sentence making, the problem with me is i cannot make sentences even i know...

the problem with me is i cannot make sentences even i know sufficient amount of vucabulary but still i cannot use them in a proper manner i go confuse what to do / please help

Looking for case study assignment help, Are you looking for case study assi...

Are you looking for case study assignment help? Do you want qualified tutors or your case study based problems? Reach us with your complete assignment details. We at www.expertsmin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd