Back to Results
First PageMeta Content
Cryptography standards / Cryptographic hash functions / Message authentication codes / HMAC / Hashing / Secure Shell / SHA-2 / SHA-1 / FIPS 140-2 / Cryptography / Error detection and correction / Cryptographic software


Non-Proprietary FIPS[removed]Security Policy
Add to Reading List

Document Date: 2007-09-19 01:00:00


Open Document

File Size: 199,82 KB

Share Result on Facebook

Company

Perform / AES / CBC / HP / Crypto Officer/User Import / Corsec Security Inc. / PRNGs Software / EMC / Twofish / The SSH Communications Security Corp / /

Event

FDA Phase / Business Partnership / /

Facility

Cryptographic Library / Services The Cryptographic Library / Physical Security The Cryptographic Library / /

IndustryTerm

security applications / software module / software library / production grade equipment / cryptographic algorithms / encryption/decryption algorithms / computer security applications / algebraic groups / software interfaces / symmetric algorithms / Internet-based data security technologies / mode management / /

OperatingSystem

Windows XP / Solaris / Linux / AIX operating system / Windows 2000 / Microsoft Windows / Windows 2003 Server / HP-UX / AIX / /

Organization

Federal Communications Commission / U.S. Government / European Central Bank / /

Person

Symmetric Key / Key Seed / /

Position

Crypto Officer / Private / Officer / /

Product

MD5 / /

Technology

encryption / cryptography / using symmetric algorithms / Public key / Symmetric key encryption/decryption algorithms / Linux / following FIPS-approved algorithms / API / Private Key / following non-FIPS-approved algorithms / Secret Key / operating system / Secure Shell / Digital Signature / Internet-based data security technologies / /

URL

http /

SocialTag