WEBINAR RECORDING: What is FIPS Cryptography? How to get FIPS 140 Compliance?

Sdílet
Vložit
  • čas přidán 26. 07. 2024
  • Get your FIPS 140 cryptography cheat sheet here: cryptosense.com/datasheets/fi...
    Join Dr Graham Steel for this webinar to discuss in detail FIPS-140 Cryptography. We have a tool that will take care of FIPS checking your applications. Get a free demo of Cryptosense Analzyer for FIPS here: cryptosense.com/analyzer/demo...
    Maintained by NIST, the Federal Information Processing Standards (FIPS) give guidance to
    external suppliers regarding the standards their products have to reach for use by the US
    Government.
    FIPS have become de facto standards for other sectors and other countries.
    FIPS 140 describes the standard for cryptographic modules.
    FIPS 140 is designed to be used by the module validation programme (CMVP).
    The list of validated modules is public at csrc.nist.gov/projects/crypto...
    program/validated-modules.
    Showing an application is compliant comes down to proving it uses a validated module for
    all in-scope cryptography.
    This webinar covers:
    - FIPS Keylengths
    - FIPS Elliptic Curves
    - FIPS Finite Field Cryptography Parameters
     
    - FIPS Block Ciphers
     
    - FIPS Block Cipher Modes
     
    - FIPS Signature Functions
     
    - FIPS Asymmetric Encryption
     
    - FIPS Hash functions
     
    - FIPS MACs
    Background References:
    - FIPS 140-2 Appendix A
    csrc.nist.gov/csrc/media/publ...
    - FIPS 140-3 Annex C
    csrc.nist.gov/publications/de...
    Note that these give identical requirements as of June 2021.
    /////
    Find out more about Cryptosense: cryptosense.com/
    Follow us on Twitter: / cryptosense
    /////
    Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
  • Věda a technologie

Komentáře • 4

  • @compuowl
    @compuowl Před 3 lety +12

    This video COMPLIES with the criteria for a high quality webinar

  • @itqna6781
    @itqna6781 Před 3 lety +4

    Brilliant... One query . Do we need to have FIPS checks at 3 levels like Application, OS and hardware to make solution end to end FIPS compliant. e.g. Windows has FIPS 140-2 approved mode of operation so why we need application crypto module running on windows to be FIPS verified/ validated

    • @Cryptosense
      @Cryptosense  Před 3 lety +4

      Hi, it depends on your specific audit, but for e.g. FedRAMP or NIST 800-53 you have to show not just that your solution has a FIPS-validated crypto module inside, but that it actually uses it to protect the relevant data.