April 2024
Intermediate to advanced
224 pages
4h 48m
English
A module implementation will include cryptographic and non-cryptographic algorithms. The non-cryptographic algorithms are typically the glue that connects the cryptographic algorithms to the module interfaces, self-test logic, zeroization logic, and data handling. Beyond the requirements for maintaining the module boundary and describing the system as a finite state model (not considering the FSM exception for Security Level 4), there is no CMVP certification requirement for ...