NSSCryptoModuleSpec/Section 1: Cryptographic Module Specification: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
m (GPHemsley moved page Section 1: Cryptographic Module Specification to NSSCryptoModuleSpec/Section 1: Cryptographic Module Specification without leaving a redirect: NSSCryptoModuleSpec page) |
||
(2 intermediate revisions by one other user not shown) | |||
Line 18: | Line 18: | ||
[http://wiki.mozilla.org/VE_01#VE.01.03.02 VE.01.03.02 ] | [http://wiki.mozilla.org/VE_01#VE.01.03.02 VE.01.03.02 ] | ||
|| | || | ||
[http://www.mozilla.org/projects/security/pki/nss/fips/secpolicy.pdf Security Policy Rule | [http://www.mozilla.org/projects/security/pki/nss/fips/secpolicy.pdf Security Policy Rule 15] <br> | ||
[http://wiki.mozilla.org/FIPS_Module_Specification#Approved_Mode_of_Operation Approved Mode of Operation] | [http://wiki.mozilla.org/FIPS_Module_Specification#Approved_Mode_of_Operation Approved Mode of Operation] | ||
|| Draft | || Draft | ||
Line 58: | Line 58: | ||
* Camellia | * Camellia | ||
* SEED | * SEED | ||
* JPAKE | |||
* HKDF | |||
|| Draft | || Draft | ||
|- | |- |
Latest revision as of 12:01, 11 May 2015
This is a draft document
Document Description |
DTR Section |
Assessment |
Status |
---|---|---|---|
Approved mode of operation | Draft | ||
Processor interfaces | VE.01.06.01 VE.01.06.02 |
(N/A) NSS is a software cryptographic module that runs on a general purpose computer. | Draft |
Modules Components | VE.01.08.01 VE.01.08.02 |
Module Components | Draft |
Cryptographic Boundary | Cryptographic Boundary | Draft | |
Physical Description | (N/A) a general purpose computer | Draft | |
Excluded Components | Module Components | Draft | |
Algorithm Certificates | Approved Algorithms
Non-Approved algorithms may only be used in non-FIPS mode, unless an exception is noted:
|
Draft | |
Hardware Diagrams | Hardware Diagram | Draft | |
Block Diagram | The physical cryptographic boundary of the NSS module surrounds all the components of the general purpose computer. The logical cryptographic boundary is shown in Cryptographic Boundary | Draft | |
Design Specification | The design of the software contained in the NSS module is specified in Design Specification | Draft | |
Security Policy | Security-Related Information Security Policy |
Draft |
Return to: NSSCryptoModuleSpec