Performance of Converged Secure Socket Layer and CMVP Cryptographic Modules

Provided by: Science & Engineering Research Support soCiety (SERSC)
Topic: Data Management
Format: PDF
Data communication is vulnerable to eavesdropping, forgery and modification in common internet environment. To guarantee the confidentiality and data integrity, cryptographic algorithms and cryptographic modules including symmetric key, public key, hash function, random number generator and digital signature are being used to accomplish the services. Cryptographic modules basically contain cryptographic algorithms such as AES, ARIA, SEED, RSAES, SHA-256, ECDSA and DH. Also the cryptographic modules have to have the extra functions for self-tests, EMI/EMC, etc.

Find By Topic