Link to home
Start Free TrialLog in
Avatar of Saif Ahmed
Saif AhmedFlag for Saudi Arabia

asked on

Cryptographic solution

Dears, I would like to achieve the attached controls. Need your suggestion please on how to achieve them.

User generated image

Avatar of btan

This reminds me of using FIPS140-3 crypto evaluated product or solution. This can be as part of policy/standard to mandate use of such FIPS140-3 solutions as long as the data encryption/decryption is implemented. It is typically applicable to key management related product like IP encryptor, HSM, Cryptographic Development Kit, etc.

The NIST Cryptographic Algorithm Validation Program (CAVP) provides validation testing of Approved (i.e., FIPS-approved and NIST-recommended) cryptographic algorithms and their individual components. Cryptographic algorithm validation is a prerequisite of cryptographic module validation.

Vendors may use any of the NVLAP-accredited Cryptographic and Security Testing (CST) Laboratories to test algorithm implementations.

An algorithm implementation successfully tested by a lab and validated by NIST is added to an appropriate validation list, which identifies the vendor, implementation, operational environment, validation date and algorithm details.

Avatar of madunix

Link to home
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial