miracle 发表于 2025-3-23 10:20:08

https://doi.org/10.1007/978-3-322-99616-9Implementation of cryptographic algorithms should be done with great caution. We look at some of the pitfalls within the FIPS140 approved algorithms that can counter the security goals for a module.

内阁 发表于 2025-3-23 16:30:26

Gabler Kompakt-Lexikon WirtschaftThis chapter describes the Cryptographic Algorithm Validation Program (CAVP) and how to certify a module’s cryptographic algorithms through the CAVP.

Fallibility 发表于 2025-3-23 21:45:40

http://reply.papertrans.cn/27/2691/269063/269063_13.png

富足女人 发表于 2025-3-24 01:11:40

Gabler Kompakt-Lexikon WirtschaftThis chapter explores some definitions and concepts of entropy and covers the entropy assessment methods and tools required by FIPS140.

半球 发表于 2025-3-24 04:47:00

http://reply.papertrans.cn/27/2691/269063/269063_15.png

ALERT 发表于 2025-3-24 08:23:24

Gabler Kompakt-Lexikon WirtschaftThis chapter identifies the various documents provided by NIST for FIPS module design and the documentation required from the designers of the modules for FIPS140 certification.

VOK 发表于 2025-3-24 13:46:58

http://reply.papertrans.cn/27/2691/269063/269063_17.png

愚蠢人 发表于 2025-3-24 18:30:39

http://reply.papertrans.cn/27/2691/269063/269063_18.png

TATE 发表于 2025-3-24 20:02:59

http://reply.papertrans.cn/27/2691/269063/269063_19.png

ABIDE 发表于 2025-3-25 00:42:27

Finite State Models,A finite state model (FSM) description of the module describes the operational and error states and how the module can transition between states.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Designing to FIPS-140; A Guide for Engineer David Johnston,Richard Fant Book 2024 David Johnston and Richard Fant 2024 FIPS-140.ACVT.CMVP.C