In April 2001, NIST updated its Cryptographic
Module Validation Module (CMVP) web pages to allow convenient user access to all of the Federal Information Processing Standard (FIPS) 140-1 validated cryptographic
module security policies.
The National Institute of Standards and Technology (NIST) publishes the Federal Information Processing Standards (FIPS) Publication to define Security Requirements for Cryptographic
The FIPS 140-1 Cryptographic
Module Validation List has become a "Who's Who" of cryptographic
and information technology vendors and developers from the United States, Canada, and abroad.
The original standard identified requirements for four security levels that provide a wide spectrum of data sensitivity for cryptographic
modules; each level offers an increase in security over the preceding level.
By integrating the HSM's smart card cryptographic
key transfer into its security solutions, G&D can ensure the ultimate level of secrecy and integrity of keys and sensitive data for its customers.
Tailored to the unique demands of the Cryptographic
Modernization Initiative, the Users Group Conference will provide attendees with hands-on operational training, in addition to educational sessions on the emerging cryptographic
architectures of the future.
The FIPS 140-2 standard, applicable to all Federal Agencies, specifies the security requirements that must be satisfied by cryptographic
modules deployed to protecting sensitive or valuable information.
This product line upgrade comes at a time when organizations are looking for solutions to allow them to deploy encryption and other cryptographic
techniques across more and more applications.
The KIV-7M meets all five Cryptographic
Modernization cornerstones and fully implements all NSA Type 1 certification requirements.
Forum Systems, the leader in Web services and SOA security infrastructure for XML acceleration, threat protection and trust management, today announced that it has successfully integrated its line of SOA Security products with the SafeNet Luna SA Ethernet-attached HSM (Hardware Security Module) in order to address the full spectrum of cryptographic
, public key, identity and content security needs of organizations with strict security demands from commercial enterprises to intelligence, defense and financial communities.
The Federal Information Processing Standard (FIPS) Publication 140-2, called "Security Requirements for Cryptographic
Modules," is a United States security standard used to certify cryptographic
modules as a prerequisite for use by government agencies.
The official validation certificate (# 626) called TID 290 - 443 OpenSSL FIPS Cryptographic
Module by Open Source Software Institute will be posted at the NIST FIPS 140-2 Cryptographic
Modules Validation List ( http://csrc.
Data is encrypted and decrypted on the fly by a certified cryptographic
engine inside an ASIC without taking up any CPU resources.
CAMBRIDGE, England -- nCipher plc (LSE:NCH), a leading provider of cryptographic
IT security solutions, announces that at the Extraordinary General Meeting of nCipher plc ('the EGM') held at 12 noon today, Shareholders passed the proposed resolution approving the acquisition of Abridean (US) Inc.
National Institute of Standards and Technology Names Cryptographic
Equipment Assessment Laboratory (CEAL) an Interim NPIVP Test Facility