Cryptographic Modules definition

Cryptographic Modules means hardware and software for encryption and decryption of radio signals and related application-spec ific integrated circuits and field- programmable gate arrays for the Military Airborne Radios Business.

Examples of Cryptographic Modules in a sentence

  • The data shall be encrypted in accordance with FIPS 140-2 Security Requirements for Cryptographic Modules and shall not be stored on systems that are shared with other commercial or Government entities.

  • To transmit sensitive information, the Contractor shall use FIPS 140-2 Security Requirements for Cryptographic Modules compliant encryption methods to protect sensitive information in attachments to email.

  • Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.

  • Examples of such requirements are The Office of Management and Budget (OMB) Circular A-130, The Federal Information Security Management Act (FISMA), NIST FIPS PUB 140-2 Security Requirements for Cryptographic Modules, the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP), and the National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI-1000.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules.

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.

  • Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted - both at rest and in transit - employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.

  • Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted – both at rest and in transit – employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.

Related to Cryptographic Modules

  • Modules means the Base Modules and Extended Modules.

  • Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.

  • Electronic device technology means any technology that involves microelectronics, semiconductors, electronic equipment, and instrumentation, radio frequency, microwave, and millimeter electronics; optical and optic-electrical devices; or data and digital communications and imaging devices.

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Firmware means software sold or licensed only in conjunction with machines, designed for execution only on a machine with which it is provided, designed only for machines other than a dedicated computer, and embedded into or installed on the machine by the machine’s manufacturer or seller.

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Interfaces means, collectively, the CAD Interface and the Channel Access Interface.

  • Computer software documentation means owner's manuals, user's manuals, installation instructions, operating instructions, and other similar items, regardless of storage medium, that explain the capabilities of the computer software or provide instructions for using the software.

  • Software means computer programs, whether in source code or object code form (including any and all software implementation of algorithms, models and methodologies), databases and compilations (including any and all data and collections of data), and all documentation (including user manuals and training materials) related to the foregoing.

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Technology means any and all technical information, specifications, drawings, records, documentation, works of authorship or other creative works, ideas, algorithms, models, databases, ciphers/keys, systems architecture, network protocols, research, development, and manufacturing information, software (including object code and source code), application programming interfaces (APIs), innovations, mask works, logic designs, circuit designs, technical data, processes and methods.

  • Kit means a set of components that are packaged together and intended to be used to perform a specific in vitro diagnostic examination, or a part thereof;

  • Catalog means the available list of tangible personal property or services, in the most current listing, regardless of date, during the life of the contract, that takes the form of a catalog, price list, schedule, shelf price or other form that:

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • System Software means Software that provides the operating and management instructions for the underlying hardware and other components, and is identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Systems Software. Such System Software includes, but is not restricted to, micro-code embedded in hardware (i.e., “firmware”), operating systems, communications, system and network management, and utility software.

  • Computer System means a computer and all input, output, processing, storage, off-line media libraries, and communication facilities which are connected to the computer and which are under the control and supervision of the operating system(s) or application(s) software used by the ASSURED.

  • Filter means material placed in the useful beam to preferentially absorb selected radiations.

  • Tyler Software means our proprietary software, including any integrations, custom modifications, and/or other related interfaces identified in the Investment Summary and licensed by us to you through this Agreement. • “we”, “us”, “our” and similar terms mean Xxxxx. • “you” and similar terms mean Client.