Examples of using Cryptographic module in English and their translations into Russian
{-}
-
Official
-
Colloquial
Storage of the RK NCA Private Key in the Cryptographic Module and Subscriber's Private.
This standard specifies the security requirements that will be satisfied by a cryptographic module.
Further location of the RK NCA private keys and cryptographic modules, containing these private keys;
A commercial cryptographic module is also commonly referred to as a hardware security module HSM.
Security requirements cover 11 areas related to the design and implementation of a cryptographic module.
An example of a Security Level 1 cryptographic module is a personal computer(PC) encryption board.
The security requirements cover areas related to the secure design and implementation of a cryptographic module.
Cryptographic modules are tested against requirements found in FIPS PUB 140-2, Security Requirements for Cryptographic Modules. .
SP 800-38E is a recommendation for the XTS-AES mode of operation,as standardized by IEEE Std 1619-2007, for cryptographic modules.
Within most areas, a cryptographic module receives a security level rating(1-4, from lowest to highest), depending on what requirements are met.
Intentional excursions beyond the normal operating ranges may be used by an attacker to thwart a cryptographic module's defenses.
Cryptographic modules that store the RK NCA private keys, does not allow storage of key material in an unencrypted form in the hardware, including RAM.
Development and introduction into armament of the world's first platform-based military GPS HGPST-T receiver integrated with a SAASM cryptographic module.
Basic security requirements are specified for a cryptographic module e.g., at least one Approved algorithm or Approved security function shall be used.
The Federal Information Processing Standard(FIPS) Publication 140-2,(FIPS PUB 140-2),is a U.S. government computer security standard used to approve cryptographic modules.
Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. .
For other areas that do not provide for different levels of security, a cryptographic module receives a rating that reflects fulfillment of all of the requirements for that area.
All cryptographic modules used by the RK NCA are certified in accordance with the requirements of applicable standard of the Republic of Kazakhstan RK ST 1073-2007 and are not lower than the second level.
All of the tests under the CMVP are handled by third-party laboratories that are accredited as Cryptographic Module Testing laboratories by the National Voluntary Laboratory Accreditation ProgramNVLAP.
HGPSTT receiver with a SAASM cryptographic module was recognised by the"defender" award for innovation in the command systems category at the 16th International Defence Industry Exhibition in Kielce.
In addition to the tamper-evident physical security mechanisms required at Security Level 2,Security Level 3 attempts to prevent the intruder from gaining access to CSPs held within the cryptographic module.
At this security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access.
Physical security mechanisms required at Security Level 3 are intended to have a high probability of detecting and responding to attempts at physical access,use or modification of the cryptographic module.
The Cryptographic Module Validation Program(CMVP) is operated jointly by the United States Government's National Institute of Standards and Technology(NIST) Computer Security Division and the Communications Security Establishment(CSE) of the Government of Canada.
The physical security mechanisms may include the useof strong enclosures and tamper-detection/response circuitry that zeroes all plaintext CSPs when the removable covers/doors of the cryptographic module are opened.
Penetration of the cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate deletion of all plaintext CSPs.
Senforce(acquired by Novell)announced in March 2004 that its products employ a FIPS 140-2 certified(Certificate No. 343) cryptographic module to protect the integrity and confidentiality of security policies.
Security Level 4 also protects a cryptographic module against a security compromise due to environmental conditions or fluctuations outside of the module's normal operating ranges for voltage and temperature.
RF Government Decree 720 of September 10, 2009, consistent with the basic provisions of the Order of the Ministry of Transport of the Russian Federation of July 31, 2012 N 285 meets the requirements of the Order of the Russian Ministry of Transport of 13 February 2013 number 36, is certified for installation on the vehicle carrying dangerous goods, has built-in cryptographic protection of information(CIPF)in the form of navigation cryptographic module HKM.
An overall rating is issued for the cryptographic module, which indicates: the minimum of the independent ratings received in the areas with levels, and the fulfillment of all the requirements in the other areas.