Back to Results
First PageMeta Content
FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard


Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc
Add to Reading List

Document Date: 2010-12-21 00:00:00


Open Document

File Size: 159,13 KB

Share Result on Facebook

Company

ADP / AES / KVL 4000 PIKE Hardware / CBC / KVL 4000 PIKE / CKR CO / Motorola / EMC / /

Event

FDA Phase / /

Facility

PIKE CRYPTOGRAPHIC BOUNDARY / PIKE User / PIKE SUPPORTED ROLES / PIKE SERVICES / PIKE Implementation The KVL / PIKE Security Levels FIPS / PIKE Cryptographic Boundary The KVL / PIKE IC / PIKE Page / PIKE IMPLEMENTATION / PIKE IN A SECURE MANNER / /

IndustryTerm

secure communications equipment / security services / host software / portable key distribution device / software/firmware integrity test / fixed network devices / software/firmware load test / data security services / /

Organization

KVL / European Central Bank / CO CSP / /

Position

Crypto-Officer / Personal Digital Assistant / CRYPTO OFFICER / Reference Cryptographic Officer / /

Product

RS232 interface / Program Update service / Cryptographic module / R01 / RS232 / Program Update / AES-256 / Cryptographic / /

Technology

inner layer encryption / Encryption / Electronic Code Book Elliptic Curve Digital Signature Algorithm / Universal Serial Bus / following Allowed algorithms / Allowed algorithms / following Approved algorithms / flash memory / Security Parameter Data Encryption / PIKE processor / following non-Approved algorithms / following FIPS Approved algorithms / Personal Digital Assistant / digital signature / PDA / Flash / Integrated Circuit / /

SocialTag