There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:FIPS 140-2 Terms
Pages in category "FIPS 140-2 Terms"
The following 75 pages are in this category, out of 75 total.
T
- Term:Approved
- Term:Approved Mode of Operation
- Term:Approved Security Function
- Term:Authentication Code
- Term:Automated Key Transport
- Term:Compromise
- Term:Confidentiality
- Term:Control Information
- Term:Critical Security Parameter
- Term:Crypto Officer
- Term:Cryptographic Boundary
- Term:Cryptographic Key
- Term:Cryptographic Key Component
- Term:Cryptographic Module
- Term:Cryptographic Module Security Policy
- Term:Data Path
- Term:Differential Power Analysis
- Term:Digital Signature
- Term:Electromagnetic Compatibility
- Term:Electromagnetic Interference
- Term:Electronic Key Entry
- Term:Encrypted Key
- Term:Environmental Failure Protection
- Term:Environmental Failure Testing
- Term:Error Detection Code
- Term:Finite State Model
- Term:Firmware
- Term:Hardware
- Term:Hash-Based Message Authentication Code
- Term:Initialization Vector
- Term:Input Data
- Term:Integrity
- Term:Interface
- Term:Key Encrypting Key
- Term:Key Establishment
- Term:Key Loader
- Term:Key Management
- Term:Key Transport
- Term:Manual Key Entry
- Term:Manual Key Transport
- Term:Microcode
- Term:Operator
- Term:Output Data
- Term:Password
- Term:Personal Identification Number
- Term:Physical Protection
- Term:Plaintext Key
- Term:Port
- Term:Private Key
- Term:Protection Profile
- Term:Public Key
- Term:Public Key (Asymmetric) Cryptographic Algorithm
- Term:Public Key Certificate
- Term:Random Number Generator
- Term:Removable Cover
- Term:Secret Key
- Term:Secret Key (Symmetric) Cryptographic Algorithm
- Term:Security Policy
- Term:Seed Key
- Term:Simple Power Analysis
- Term:Software
- Term:Split Knowledge
- Term:Status Information
- Term:System Software
- Term:Tamper Detection
- Term:Tamper Evidence
- Term:Tamper Response
- Term:Target of Evaluation
- Term:TEMPEST
- Term:TOE Security Functions
- Term:TOE Security Policy
- Term:Trusted Path
- Term:User
- Term:Validation Authorities
- Term:Zeroization