Web Results

FIPS 140-2 - Wikipedia

en.wikipedia.org/wiki/FIPS_140-2

Basic security requirements are specified for a cryptographic module (e.g., at least one Approved algorithm or Approved security function shall be used).

encryption - FIPS 140-2 Compliant Algorithms - Cryptography Stack ...

crypto.stackexchange.com/questions/3859/fips-140-2-compliant-algorithms

Sep 21, 2012 ... Take a look at FIPS 140-2 Annex A. It lists the following: ... Note that the list of FIPS-approved algorithms does change at times; not extremely ...

Algorithm Validation Lists - Cryptographic Algorithm Validation ...

csrc.nist.gov/groups/STM/cavp/validation.html

Mar 31, 2016 ... Validation lists (current and historical) identifying algorithm ... the implementation and/or use of any algorithm located on the following lists should first ... A cryptographic module validated to FIPS 140-2 shall implement at least ...

FIPS 140-2 - Annex A - NIST Computer Security Resource Center

csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf

Apr 8, 2016 ... Annex A: Approved Security Functions ... These areas include the following: ... modules to FIPS PUB 140-2 and other cryptography based standards. .... American Bankers Association, Triple Data Encryption Algorithm Modes ...

Advanced Encryption Standard Algorithm Validation List

csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html

Advanced Encryption Standard (AES) Algorithm Validated Implementations ..... Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, ...

FIPS 140-2 Validated Encryption - Lumension

www.lumension.com/device-control-software/usb-security-protection/fips-140-2-encryption.aspx

What encryption algorithms does ... Kernel uses the following FIPS-approved ...

What is FIPS 140-2 and How is it Used in the DoD Community?

www.seguetech.com/fips-140-2-how-used-federal-government-dod/

May 8, 2014 ... I won't go into detail about the specific requirement areas, but a FIPS 140-2 compliant crypto module must satisfy the following: Cryptographic ...

FIPS 140 Validation - TechNet - Microsoft

technet.microsoft.com/en-us/library/cc750357.aspx

Microsoft maintains FIPS 140-2 validation for two ... The following tables identify the specific versions ... A full listing of cryptographic algorithms supported by each ...

FIPS 140-2 for Mere Mortals | Archimedes Newton

archimedesnewton.com/2010/12/20/fips-140-2-for-mere-mortals/

Dec 20, 2010 ... For any of you going through issues with FIPS 140-2 compliance, perhaps it will ... for a cryptographic module (e.g., at least one Approved algorithm or ... In the end, the following methods are the only approved cryptographic ...

Transport Layer Protection Cheat Sheet - OWASP

www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet

Jan 10, 2017 ... TLS; 2.4 When to Use a FIPS 140-2 Validated Cryptomodule; 2.5 Secure ... 2.7.3 Rule - Only Support Strong Cryptographic Ciphers; 2.7.4 Rule - Support ... TLS does not offer any of these security benefits to data that is at rest.