Cryptographic Modules definition

Cryptographic Modules means hardware and software for encryption and decryption of radio signals and related application-spec ific integrated circuits and field- programmable gate arrays for the Military Airborne Radios Business.

Examples of Cryptographic Modules in a sentence

  • The data shall be encrypted in accordance with FIPS 140-2 Security Requirements for Cryptographic Modules and shall not be stored on systems that are shared with other commercial or Government entities.

  • To transmit sensitive information, the Contractor shall use FIPS 140-2 Security Requirements for Cryptographic Modules compliant encryption methods to protect sensitive information in attachments to email.

  • Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.

  • Examples of such requirements are The Office of Management and Budget (OMB) Circular A-130, The Federal Information Security Management Act (FISMA), NIST FIPS PUB 140-2 Security Requirements for Cryptographic Modules, the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP), and the National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI-1000.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules.

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.

  • Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted - both at rest and in transit - employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.

  • Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted – both at rest and in transit – employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.

Related to Cryptographic Modules

  • Modules means the Base Modules and Extended Modules.

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Software means any computer software programs, including all source code, object code, and documentation related thereto and all software modules, tools and databases.

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Catalog means the available list of tangible personal property or services, in the most current listing, regardless of date, during the life of the contract, that takes the form of a catalog, price list, schedule, shelf price or other form that:

  • System Software means Software that provides the operating and management instructions for the underlying hardware and other components, and is identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Systems Software. Such System Software includes, but is not restricted to, micro-code embedded in hardware (i.e., “firmware”), operating systems, communications, system and network management, and utility software.