02901nam 22004933 450 991085539580332120240503080329.09798868801259(CKB)31801416600041(MiAaPQ)EBC31306222(Au-PeEL)EBL31306222(OCoLC)1432158088(OCoLC-P)1432158088(CaSebORM)9798868801259(EXLCZ)993180141660004120240503d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierDesigning to FIPS-140 A Guide for Engineers and Programmers1st ed.Berkeley, CA :Apress L. P.,2024.©2024.1 online resource (224 pages)Includes index.9798868801242 This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs such as AIS31, GM/T-0005-2021, etc.). It also covers how to perform compliance testing. By the end of the book, you will know how to interact with accredited certification labs and with related industry forums (CMUF, ICMC). In short, the book covers everything you need to know to make sound designs. There is a process for FIPS-140 (Federal Information Processing Standard) certification for cryptographic products sold to the US government. And there are parallel certifications in other countries, resulting in a non-trivial and complex process. A large market of companies has grown to help companies navigate the FIPS-140 certification process. And there are accredited certification labs you must contract toget the certification. Although this was once a fairly niche topic, it is no longer so. Other industries—banking, military, healthcare, air travel, and more—have adopted FIPS certification for cryptographic products. The demand for these services has grown exponentially. Still, the available skills pool has not grown. Many people are working on products with zero usable information on what to do to meet these standards and achieve certification or even understand if such certification applies to their products.Data encryption (Computer science)CryptographyComputer securityStandardsData encryption (Computer science)Cryptography.Computer securityStandards.005.8/24Johnston David529126Fant Richard1737948MiAaPQMiAaPQMiAaPQ9910855395803321Designing to FIPS-1404159939UNINA