FIPS 140-2 DTR: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
[[ VE_01 | Section 1: Cryptographic Module Specifcation ]] | [[ VE_01 | Section 1: Cryptographic Module Specifcation ]] | ||
[[ VE_02 | Section 2: Module Ports and Interfaces ]] | [[ VE_02 | Section 2: Cryptographic Module Ports and Interfaces ]] | ||
[[ VE_03 | Section 3: Roles, Services, and Authentication ]] | [[ VE_03 | Section 3: Roles, Services, and Authentication ]] | ||
| Line 9: | Line 9: | ||
[[ VE_05 | Section 5: Physical Security (N/A) ]] | [[ VE_05 | Section 5: Physical Security (N/A) ]] | ||
[[ VE_06 | Section 6: | [[ VE_06 | Section 6: Operational Enviroment ]] | ||
[[ VE_07 | Section 7: Cryptographic Key Management ]] | [[ VE_07 | Section 7: Cryptographic Key Management ]] | ||
| Line 15: | Line 15: | ||
[[ VE_08 | Section 8: EMI/EMC ]] | [[ VE_08 | Section 8: EMI/EMC ]] | ||
[[ VE_09 | Section 9: Self Tests ]] | [[ VE_09 | Section 9: Self-Tests ]] | ||
[[ VE_10 | Section 10: Design Assurance ]] | [[ VE_10 | Section 10: Design Assurance ]] | ||
[[ VE_11 | Section 11: Mitigation of | [[ VE_11 | Section 11: Mitigation of Other Attacks ]] | ||
[[ | [[ VE_14 | Appendix C: Cryptographic Module Security Policy ]] | ||