Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Religion, how did the periods of persecution cause the church to think abou...

how did the periods of persecution cause the church to think about the doctrines of salvation and church?

B.Ed, What is pragmatism and what should be the role of teacher according t...

What is pragmatism and what should be the role of teacher according ti it.

Library stacking, what do you understand by stacking? discuss the different...

what do you understand by stacking? discuss the different methods of stacking in libraries.

Business Analysis, In the following scenario, state which entities and rela...

In the following scenario, state which entities and relationships are needed to create the following query: What is the average time it takes for suppliers to deliver our orders?

History of new media, History of New media: The term has actually been use...

History of New media: The term has actually been used since the 1970s by researchers conducting social, psychological, economic, political and cultural studies of information and

How technology can improve online learning, Please reply to this first stud...

Please reply to this first student response: How technology can improve online learning In this article "How Technology Can Improve Online Learning" Robert Mendenhall tells us more

Conservation and restoration ecology , What do Conservation and Restoration...

What do Conservation and Restoration Ecology majors study? 1. Solid foundation in biological sciences, soil science, chemistry, and math. 2. Ecology of wild land plants and ani

Virginia, what is on the license plate and why

what is on the license plate and why

Institution, Why have schools endured over time?

Why have schools endured over time?

M-commerce, WHAT IS M-COMMERCE? M-commerce or mobile commerce is the bu...

WHAT IS M-COMMERCE? M-commerce or mobile commerce is the buying and selling of services and goods through wireless technology- i.e. handheld devices such as and personal digita

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd