Setting Requirements for Design, Implementation, Validation, and Robustness in Cryptography Equipment

The National Institute of Standards and Technology (NIST) Federal Information Processing Standard FIPS 140-2 for Cryptography is an internationally recognized security certification standard for commercial cryptography. Applicable to both hardware and software based cryptography, the FIPS 140-2 standard sets out the requirements related to design, implementation, validation, and robustness to ensure cryptography equipment operates as expected.

Cryptography refers to the algorithms and protocols used to secure or “hide” data from unauthorized access by means of encrypting and decrypting data. Common cryptography techniques include symmetric-key algorithms such as DES/3DES and AES, as well as public-key algorithms such as RSA. Cryptography key management is also a significant factor in the FIPS 140-2 standard.

Modern cryptography is used today in almost all forms of commerce, such as the financial markets and for internet data security, and in the defense industry for data and communications security.

The FIPS 140-2 standard provides four increasingly higher levels of security, numbered Level 1 thru Level 4, covering a wide range of security applications and environments. Level 1 covers basic security, whereas Level 4 provides the highest level of security. Most commonly, commercial FIPS 140-2 validated products are validated to Levels 2 or 3.

Equipment is evaluated independently and validation is governed by the Cryptographic Module Validation Program (CMVP), a joint venture between the NIST in the United States, and the Communications Security Establishment (CSE) in Canada.

Curtiss-Wright Defense Solutions offers a range of products designed to the FIPS 140-2 standard. Some of these products include:

Vortex 3U VPX Flash Storage Module FIPS 140-2 Validated - certificate #1885
Vortex Compact Network Storage 1/2 ATR network file server
Vortex Data Transport System DZUS network file server
VPX3-685 3U VPX Secure Ethernet Router Common Criteria Certified and FIPS 140-2 Validated - certificate #

Infocenter

Switch vs Router: What’s the Difference? As networking products have become more complex, the definitions of “switch”... MORE> Linking Outside the Box: Connecting Embedded Systems to Wide-Area Networks This white paper looks at the challenge of connecting embedded systems to... MORE> Small Form Factor Mission Systems: Driving Forward the Development of Next Generation UUVs A system integrator required small form factor (SFF) mission processors, network... MORE> Staying Connected: High Availability Embedded Networking Embedded systems are increasingly connected to local and wide-area networks to... MORE> Leveraging Commercial Encryption outside the United States With its unique 2-Layer encryption technology, the DTS1 seamlessly integrates both... MORE> Getting up to speed on NSA-approved two-layer commercial encryption Paul Davis looks at how CSfC allows system designers to now deploy a commercial... MORE> Using NetBoot to Reduce Maintenance and SWaP-C in Embedded Systems This white paper looks at how NetBoot brings new efficiencies, better security,... MORE> Multi-Gigabit Ethernet – Beyond 1000BASE-T This white paper looks at how, as the performance of embedded systems and
sensors... MORE>
DTS1 - Protect your Data-at-Rest The DTS1 was engineered with Top Secret data-at-rest protection in mind in order... MORE> The Advantages of Netbooting for Embedded Systems Paul Davis looks at how netbooting provides a superior alternative solution for... MORE> Aircraft looks to Modernize Storage of Sensitive Data A leading C4ISR system integrator reached out to Curtiss-Wright in search of a... MORE> CNS4 Flexible Data Storage in 3 Dimensions When selecting a rugged secure storage solution you must consider the three... MORE>
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic