Link to home
Start Free TrialLog in
Avatar of Saif Ahmed
Saif AhmedFlag for Saudi Arabia

asked on

Cryptographic solution

Dears, I would like to achieve the attached controls. Need your suggestion please on how to achieve them.


User generated image


Avatar of btan
btan

This reminds me of using FIPS140-3 crypto evaluated product or solution. This can be as part of policy/standard to mandate use of such FIPS140-3 solutions as long as the data encryption/decryption is implemented. It is typically applicable to key management related product like IP encryptor, HSM, Cryptographic Development Kit, etc.


https://csrc.nist.gov/Projects/cryptographic-module-validation-program/modules-in-process/IUT-List


The NIST Cryptographic Algorithm Validation Program (CAVP) provides validation testing of Approved (i.e., FIPS-approved and NIST-recommended) cryptographic algorithms and their individual components. Cryptographic algorithm validation is a prerequisite of cryptographic module validation.

Vendors may use any of the NVLAP-accredited Cryptographic and Security Testing (CST) Laboratories to test algorithm implementations.


An algorithm implementation successfully tested by a lab and validated by NIST is added to an appropriate validation list, which identifies the vendor, implementation, operational environment, validation date and algorithm details.


https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program


ASKER CERTIFIED SOLUTION
Avatar of madunix
madunix

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial