Skip to Main Content
Designing to FIPS-140: A Guide for Engineers and Programmers
book

Designing to FIPS-140: A Guide for Engineers and Programmers

by David Johnston, Richard Fant
April 2024
Intermediate to advanced content levelIntermediate to advanced
224 pages
4h 48m
English
Apress
Content preview from Designing to FIPS-140: A Guide for Engineers and Programmers
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
D. Johnston, R. FantDesigning to FIPS-140https://doi.org/10.1007/979-8-8688-0125-9_5

5. Counter Security Features of NIST-Approved Cryptographic Algorithms

David Johnston1   and Richard Fant2
(1)
Hillsboro, OR, USA
(2)
Austin, TX, USA
 

There are several requirements in FIPS 140-3 and the subordinate algorithm documents that enforce the use of vulnerable constructs or permit combinations and parameterizations that would undermine security.

The best course of action is to be aware of these issues and work around them by providing mitigations to the vulnerability and not making poor parameter and configuration choices.

5.1 General Principles of Poor Cryptographic Design ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Software Architect’s Handbook

Software Architect’s Handbook

Joseph Ingeno
The Creative Programmer

The Creative Programmer

Wouter Groeneveld

Publisher Resources

ISBN: 9798868801259Purchase LinkPublisher Website