Updated Implementation Guidance:
- G.5 Maintaining validation compliance of software or firmware cryptographic modules
- Included reference to the impact to the generated key strength assurance when porting, and vendor Security Policy updates.
- G.13 Instructions for Validation Information Formatting
- For all embodiments, the OE shall be specified on the validation entry.
- G.14 Validation of Transitioning Cryptographic Algorithms and Key Lengths
- Addressed two-key Triple-DES requirements.
- D.8 Key Agreement Methods
- IG updated to address SP 800-135rev1.
No comments:
Post a Comment