This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity e. The content area displays items that have been created or shared within a collection. This is the default view when entering a collection. The content area displays items that have been created or shared within a solution. This is the default view when entering a solution. The navigation menu provides access to a collection's main sections, such as the members list, its description, etc.
|Published (Last):||8 May 2005|
|PDF File Size:||16.65 Mb|
|ePub File Size:||3.14 Mb|
|Price:||Free* [*Free Regsitration Required]|
Active, Most Current. Prices subject to change without notice. About Us. Contact Us. Sign In. Standards Store. Purchase History. Currency display settings. Manage society memberships. Featured Products. View All Publishers. Quality Management. SCC Standards Store. Popular Standards Bundles. Drawing and Drafting. Telecommunications Standards. AWS D1. Means, Inc. Look Inside. Complete Document. Information technology - Security techniques - Security requirements for cryptographic modules.
Detail Summary View all details. Price USD. Single User. In Stock. Need it fast? Ask for rush delivery. Most backordered items can be rushed in from the publisher in as little as 24 hours. Some rush fees may apply. Add to Cart. View Full Details and Buy. Complementary Documents and Links:. This International Standard specifies the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems.
This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity e. This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level.
This International Standard specifies security requirements specified intended to maintain the security provided by a cryptographic module and compliance to this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.
Browse Publishers. Top Sellers. My Account. Corporate Sustainability. Investor Relations. All Rights Reserved. Update Cart. Create New Account.
Active, Most Current. Prices subject to change without notice. About Us. Contact Us. Sign In. Standards Store.
Efforts to update FIPS date back to the early s. The FIPS Draft was scheduled for signature by the Secretary of Commerce in August , however that never happened and the draft was subsequently abandoned. The draft of FIPS was also abandoned. The update process for FIPS has been hamstrung by deep technical issues in topics such as hardware security  and apparent disagreement in the US government over the path forward. The now abandoned draft of FIPS had required mitigation of non-invasive attacks when validating at higher security levels, introduced the concept of public security parameter, allowed the deference of certain self-tests until specific conditions are met, and strengthened the requirements on user authentication and integrity testing.
You are viewing this page in an unauthorized frame window.
Your Alert Profile lists the documents that will be monitored. If the document is revised or amended, you will be notified by email. You may delete a document from your Alert Profile at any time. This standard is also available to be included in Standards Subscriptions.