Skip to Main Content
Designing to FIPS-140: A Guide for Engineers and Programmers
book

Designing to FIPS-140: A Guide for Engineers and Programmers

by David Johnston, Richard Fant
April 2024
Intermediate to advanced content levelIntermediate to advanced
224 pages
4h 48m
English
Apress
Content preview from Designing to FIPS-140: A Guide for Engineers and Programmers
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
D. Johnston, R. FantDesigning to FIPS-140https://doi.org/10.1007/979-8-8688-0125-9_4

4. Approved Algorithms

David Johnston1   and Richard Fant2
(1)
Hillsboro, OR, USA
(2)
Austin, TX, USA
 

A module implementation will include cryptographic and non-cryptographic algorithms. The non-cryptographic algorithms are typically the glue that connects the cryptographic algorithms to the module interfaces, self-test logic, zeroization logic, and data handling. Beyond the requirements for maintaining the module boundary and describing the system as a finite state model (not considering the FSM exception for Security Level 4), there is no CMVP certification requirement for ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Software Architect’s Handbook

Software Architect’s Handbook

Joseph Ingeno
The Creative Programmer

The Creative Programmer

Wouter Groeneveld

Publisher Resources

ISBN: 9798868801259Purchase LinkPublisher Website