Cryptographic Module Validation Program
- Cryptographic Module Validation Program
-
Logo of the Cryptographic Module Validation Program.
The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to have their products certified for use by the U.S. Government and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate "sensitive, but not classified" information. All of the tests under the CMVP are handled by third-party laboratories that are accredited as Cryptographic Module Testing Laboratories by the National Voluntary Laboratory Accreditation Program (NVLAP). Product certifications under the CMVP are performed in accordance with the requirements of FIPS 140-2.
The CMVP was established by the U.S. National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) of the Government of Canada in July 1995.
See also
- Cryptographic Algorithm Validation Program (CAVP)
External links
Wikimedia Foundation.
2010.
Look at other dictionaries:
Cryptographic Module Testing Laboratory — A Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140 2 U.S. Government standard. The … Wikipedia
FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… … Wikipedia
Crypto++ — Developer(s) Wei Dai Initial release 1995 Stable release 5.6.1 / August 9, 2010; 14 months ago ( … Wikipedia
FIPS 140 — The Federal Information Processing Standard 140 (FIPS) are series of publications numbered 140 which are a U.S. government computer security standards that specify requirements for cryptography modules. As of December 2006, the current version of … Wikipedia
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia
OpenSSL — Developer(s) The OpenSSL Project Stable release 1.0.0e (6 September 2011; 2 months ago (2011 09 06)[ … Wikipedia
Avaya Secure Router 4134 — The Avaya Secure Router 4134 (or SR 4134) in telecommunications and computer networking technologies is a device manufactured by Avaya that combines the functions of WAN Routing, stateful firewall security, Ethernet switching, IP telephony, and… … Wikipedia
SHA-2 — У этого термина существуют и другие значения, см. SHA. SHA 2 (англ. Secure Hash Algorithm Version 2 безопасный алгоритм хеширования, версия 2) семейство криптографических алгоритмов однонаправленных хеш функций, включающее в… … Википедия
SHA-224 — SHA 2 (англ. Secure Hash Algorithm Version 2 безопасный алгоритм хеширования, версия 2) собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… … Википедия
SHA-256 — SHA 2 (англ. Secure Hash Algorithm Version 2 безопасный алгоритм хеширования, версия 2) собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… … Википедия