A module implementation will include cryptographic and non-cryptographic algorithms. The non-cryptographic algorithms are typically the glue that connects the cryptographic algorithms to the module interfaces, self-test logic, zeroization logic, and data handling. Beyond the requirements for maintaining the module boundary and describing the system as a finite state model (not considering the FSM exception for Security Level 4), there is no CMVP certification requirement for ...
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
D. Johnston, R. FantDesigning to FIPS-140https://doi.org/10.1007/979-8-8688-0125-9_44. Approved Algorithms
Get Designing to FIPS-140: A Guide for Engineers and Programmers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.