NIST FIPS 140-2 Cryptography

NIST FIPS 140-2 Cryptography
NIST FIPS 140-2 Cryptography
 
What is NIST FIPS 140-2 Commercial Cryptography?

The National Institute of Standards and Technology (NIST) Federal Information Processing Standard FIPS 140-2 for Cryptography is an internationally recognized security certification standard for commercial cryptography. Applicable to both hardware and software based cryptography, the FIPS 140-2 standard sets out the requirements related to design, implementation, validation, and robustness to ensure cryptography equipment operates as expected.

Solutions designed to the FIPS 140-2 standard

DTS1 network attached file server  
DTS1

1-slot Rugged Network Attached File Server

DTS3: 3-Slot Rugged Network Attached File Server  
DTS3

3-slot Rugged Network Attached File Server

CNS2-FC Network Attached Storage  
CNS2-FC

2-slot Rugged Network Attached Storage with Fibre Channel and iSCSI

CNS4 Rugged Network File Server  
CNS4

4-slot Rugged Network File Server

3U VPX Flash Storage Module  
FSM

3U VPX Flash Storage Module with FIPS ASIC

Setting requirements for design, implementation, validation, and robustness in cryptography equipment

Cryptography refers to the algorithms and protocols used to secure or “hide” data from unauthorized access through encrypting and decrypting data. Common cryptography techniques include symmetric-key algorithms such as DES/3DES and AES and public-key algorithms such as RSA. Cryptography key management is also a significant factor in the FIPS 140-2 standard.

Modern cryptography is used today in almost all forms of commerce, such as the financial markets, internet data security, and the defense industry for data and communications security.

The FIPS 140-2 standard provides four increasingly higher levels of security, numbered Level 1 thru Level 4, covering a wide range of security applications and environments. Level 1 covers basic security, whereas Level 4 provides the highest level of security. Commercial FIPS 140-2 validated products are most commonly validated to Levels 2 or 3.

Equipment is evaluated independently, and validation is governed by the Cryptographic Module Validation Program (CMVP), a joint venture between the NIST in the United States and Canada's Communications Security Establishment (CSE).

 

Certification Authorities for Trusted Computing in Military & Avionics

This white paper provides an overview of some of the certification authorities that are involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved. While this white paper will focus specifically on the US market, it also discusses ways in which these bodies are relevant (or not) in some international markets.

Read the White Paper

Choosing the Best Location for Your Data-At-Rest Encryption Technology

This paper discusses the different places the encryption technology can be located on a data storage solution and aims to help you chose a solution that is best for your application.

Explore DAR Encryption Approaches

NSA Type 1 Encryption  
NSA Type 1 Encryption

Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.

NSA CSfC and Common Criteria  
NSA CSfC and Common Criteria

Strategy to deliver secure solutions that leverage commercial technologies and products.