Implementations of cryptographic modules, Other Subject

Assignment Help:

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.


Related Discussions:- Implementations of cryptographic modules

Marketing, . control overthe macro-environment

. control overthe macro-environment

Lanthinides contraction, how i present my assignment on lanthinides contrac...

how i present my assignment on lanthinides contraction nd give me ideas on it

Ethical issues that must be considered in introducing cars, In May, 2012, N...

In May, 2012, Nevada became the first state to grant a license to a self-driven car. The Google Computer Driven Car has driven over 175,000 miles, albeit with a human driver behind

Business resources, Describe the full range of recruitment documents that a...

Describe the full range of recruitment documents that are used by BSiX in the recruitment and selection of a Learning Centre (Library) Administrator. What documents do you need

Lifestyle, Lifestyle: Lifestyle is a way of living of individuals, familie...

Lifestyle: Lifestyle is a way of living of individuals, families (households), and societies, which they manifest in coping with their physical, psychological, social, and economi

Marketplace connectivity for asynchronous processes, Marketplace Connectivi...

Marketplace Connectivity for Asynchronous Processes As illustrated in Figure 1, IBM's WCS MPE provides diverse trading mechanisms, such as fixed-price buying, exchanges contrac

Describe the posec method of time management, Question: 1. Describe any...

Question: 1. Describe any two personality characteristics in an organization. 2. Describe the POSEC method of time management 3. Why are goals important? Why should the

1989 constitution of the federal republic of nigeria, state the relevant pr...

state the relevant provisions of the now moribund 1989 constitution of the federal republic of nigeria

Describe the term supervision, Question 1: (a) Explain the five main pu...

Question 1: (a) Explain the five main purposes of code of ethics in counseling. (b) Explain how attitude and orientation of a counselor in any psychotherapy is of highly i

Production and operation management, What do you understand by “line balanc...

What do you understand by “line balancing”? What happens if balance doesn’t exist?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd