Cryptographic Module Validation Program

Cryptographic Module Validation Program
Logo of the Cryptographic Module Validation Program.

The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to have their products certified for use by the U.S. Government and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate "sensitive, but not classified" information. All of the tests under the CMVP are handled by third-party laboratories that are accredited as Cryptographic Module Testing Laboratories by the National Voluntary Laboratory Accreditation Program (NVLAP). Product certifications under the CMVP are performed in accordance with the requirements of FIPS 140-2.

The CMVP was established by the U.S. National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) of the Government of Canada in July 1995.

See also

  • Cryptographic Algorithm Validation Program (CAVP)

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Cryptographic Module Testing Laboratory — A Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140 2 U.S. Government standard. The …   Wikipedia

  • FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… …   Wikipedia

  • Crypto++ — Developer(s) Wei Dai Initial release 1995 Stable release 5.6.1 / August 9, 2010; 14 months ago ( …   Wikipedia

  • FIPS 140 — The Federal Information Processing Standard 140 (FIPS) are series of publications numbered 140 which are a U.S. government computer security standards that specify requirements for cryptography modules. As of December 2006, the current version of …   Wikipedia

  • Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… …   Wikipedia

  • OpenSSL — Developer(s) The OpenSSL Project Stable release 1.0.0e  (6 September 2011; 2 months ago (2011 09 06)[ …   Wikipedia

  • Avaya Secure Router 4134 — The Avaya Secure Router 4134 (or SR 4134) in telecommunications and computer networking technologies is a device manufactured by Avaya that combines the functions of WAN Routing, stateful firewall security, Ethernet switching, IP telephony, and… …   Wikipedia

  • SHA-2 — У этого термина существуют и другие значения, см. SHA. SHA 2 (англ. Secure Hash Algorithm Version 2  безопасный алгоритм хеширования, версия 2)  семейство криптографических алгоритмов  однонаправленных хеш функций, включающее в… …   Википедия

  • SHA-224 — SHA 2 (англ. Secure Hash Algorithm Version 2  безопасный алгоритм хеширования, версия 2)  собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… …   Википедия

  • SHA-256 — SHA 2 (англ. Secure Hash Algorithm Version 2  безопасный алгоритм хеширования, версия 2)  собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… …   Википедия

Share the article and excerpts

Direct link
https://en-academic.com/dic.nsf/enwiki/444430 Do a right-click on the link above
and select “Copy Link”