<--- Back to Details
First PageDocument Content
Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions
Date: 2014-12-02 08:38:26
Cryptographic software
Advanced Encryption Standard
FIPS 140-2
SHA-1
SHA-2
PKCS
Key size
Cryptographic Module Validation Program
HMAC
Cryptography
Cryptography standards
Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 547,36 KB

Share Document on Facebook

Similar Documents

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1qzKV - View Document

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1q0mJ - View Document

Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

DocID: 1pWnz - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

DocID: 1pFYl - View Document