Back to Results
First PageMeta Content
Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing


Cryptolite Security Policy-o.PDF
Add to Reading List

Document Date: 2007-09-19 01:00:00


Open Document

File Size: 146,87 KB

Share Result on Facebook

Company

Sun Microsystems / EMC / CBC / CVS / HP / International Business Machines Corporation / IBM Corp. / RSA DSI Inc. / /

Country

United States / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

CryptoLite library / FIPS PUB / /

IndustryTerm

on-line implementation guidelines / software integrity test / configuration management / hash algorithm / main frame systems / software cryptographic module / cryptographic algorithms / hash algorithms / cryptographic services / /

OperatingSystem

Unix / Linux / AIX / Solaris / Windows 2000 / Microsoft Windows / HP-UX / /

Organization

Federal Communications Commission / /

Position

crypto officer / /

Product

CryptoLite module / Windows 2000 / CryptoLite / 3DES- MDC1 / X9 / RC6 / SHA256 / /

ProgrammingLanguage

Java / EC / /

PublishedMedium

the CryptoLite User Guide / /

Technology

SHA384 Hash algorithm / Application Program Interface / 15 FIPS Approved No No Yes SHA256 Hash algorithm / Linux / UNIX / API / block cipher / SHA512 Hash algorithm / private key / operating system / operating systems / Encryption / FIPS180-1 Hash algorithm / SHA-1 hash algorithm / Cryptography / 1321 Hash algorithm / Public Key / Java / Finite State Machine / firewall / hash algorithms / Functions Algorithm MD2 MD5 SHA-1 Specification IETF RFC1319 Hash algorithm / Unix password encryption / 256 BLOWFISH Public Key Algorithm / Digital Signature / on-line implementation guidelines Digital Encryption / FIPS algorithms / Stream cipher / /

SocialTag