Basic security requirements are specified for a cryptographic module (e.g., at
least one Approved algorithm or Approved security function shall be used).
Sep 21, 2012 ... Take a look at FIPS 140-2 Annex A. It lists the following: ... Note that the list of
FIPS-approved algorithms does change at times; not extremely ...
Dec 20, 2010 ... For any of you going through issues with FIPS 140-2 compliance, ... In the end,
the following methods are the only approved cryptographic ...
The Lumension® Cryptographic Kernel uses the following FIPS-approved ...
approved by FIPS 140-2, and 2) be validated by the Cryptographic Module.
Validation ... A FIPS-validated solution must use cryptographic algorithms and
hash functions approved by FIPS. The following are three examples of such
May 8, 2014 ... I won't go into detail about the specific requirement areas, but a FIPS 140-2
compliant crypto module must satisfy the following: Cryptographic ...
In the FIPS 140-2 compliant mode, AES or SSL are the only supported encryption
algorithms. Refer to ... To resolve this issue, perform these steps: Go to the ...
Microsoft maintains FIPS 140-2 validation for two ... The following tables identify
the specific versions ... A full listing of cryptographic algorithms supported by
different vendor solutions and their use of these approved algorithms. ... FIPS
PUB 140-2 validated cryptographic module is just one layer in a “Defense in.
In FIPS 140 mode, you cannot use an algorithm from the following summarized ...
lists of algorithms, study the security policy references in FIPS 140-2 Level 1 ...