Corsec - FIPS 140-2

Key Agreement Schemes

As the Cryptographic Module Validation Program (CMVP) prepares for the transition to automated algorithm testing, more and more algorithms are being subjected to the testing process. Testing for the key agreement schemes specified in NIST ...

Read more

ESV Header

Entropy for FIPS and Common Criteria: What Is It?

In the world of cryptography, data is only safe as long as the keys used to protect that data are kept secure. While, on one hand, this means that keys must be protected against unauthorized access, it also means that keys must be created in a way that makes them difficult for an attacker to guess. To produce cryptographically strong…