{"id":4148,"date":"2010-11-12T03:58:00","date_gmt":"2010-11-12T02:58:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=4148"},"modified":"2024-08-13T04:00:56","modified_gmt":"2024-08-13T02:00:56","slug":"atsec-pierson-miikoo-cavp-2010","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-pierson-miikoo-cavp-2010\/","title":{"rendered":"atsec\u5b8c\u6210\u76ae\u5c14\u68ee\uff08PIERSON\uff09MIIKOO\u7684\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5"},"content":{"rendered":"\n
\u4e2d\u56fd\uff0c\u5317\u4eac –<\/strong> \u6700\u8fd1\uff0catsec\u4fe1\u606f\u5b89\u5168\u5bf9\u76ae\u5c14\u68ee\u79d1\u6280\uff08Pierson Capital Technology LLC\uff0cPCT\uff09\u63d0\u4f9b\u7684MIIKOO\u5bc6\u7801\u6a21\u5757\u4e2d\u7684\u5bc6\u7801\u7b97\u6cd5\u8fdb\u884c\u4e86\u6d4b\u8bd5\u3002\u6a21\u5757\u5b9e\u73b0\u4e865\u9879FIPS\u8ba4\u53ef\u7684\u5bc6\u7801\u7b97\u6cd5\uff0c\u5728\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u4e0e\u6280\u672f\u7814\u7a76\u6240\uff08National Institute of Standards and Technology\uff0cNIST\uff09\u7ef4\u62a4\u7684\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u4f53\u7cfb(Cryptographic Algorithm Validation Program\uff0cCAVP)\u4e0b\u5168\u90e8\u9a8c\u8bc1\u901a\u8fc7\u3002\u8fd9\u662f\u5bf9MIIKOO\u8fdb\u884c\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u4f53\u7cfb\uff08Cryptographic Module Validation Program\uff0cCMVP\uff09\u6d4b\u8bd5\u8fc7\u7a0b\u4e2d\u76ae\u5c14\u68ee\u79d1\u6280\u53d6\u5f97\u7684\u4e00\u4e2a\u91cd\u8981\u7684\u91cc\u7a0b\u724c\u3002<\/p>\n\n\n\n NIST\u8bc1\u4e66\u9a8c\u8bc1\u4e86MIIKOO\u4e2d\u7684\u7b97\u6cd5\u662f\u4e25\u683c\u7684\u9075\u5faaCAVP\u51c6\u5219\u5f00\u53d1\u5b9e\u73b0\u7684\u3002Frank Psaila\uff0c\u76ae\u5c14\u68ee\u79d1\u6280\u603b\u7ecf\u7406\u8868\u793a\uff1a\u201c\u6211\u4eec\u5728\u4e3a\u9ad8\u7aef\u5ba2\u6237\u63d0\u4f9b\u5b89\u5168\u73af\u5883\u65b9\u9762\u7684\u627f\u8bfa\u548c\u6280\u672f\u5df2\u7ecf\u6210\u4e3a\u4e86\u63a8\u52a8\u6211\u4eec\u52aa\u529b\u901a\u8fc7\u8fd9\u6b21\u8ba4\u8bc1\u8fc7\u7a0b\u7684\u52a8\u529b\u3002\u6211\u4eec\u76f8\u4fe1\uff0c\u6211\u4eec\u7684\u5c16\u7aef\u6280\u672f\u662f\u5728\u5404\u79cd\u7ea7\u522b\u7684\u5b89\u5168\u94fe\u4e0b\u63d0\u4f9b\u7b80\u5355\u7684\u3001\u53ef\u8d1f\u62c5\u7684\u3001\u4e14\u4f9d\u7136\u7528\u6237\u53cb\u597d\u7684\u89e3\u51b3\u65b9\u6848\u7684\u5148\u950b\u3002\u201d\uff08\u539f\u6587\u5982\u4e0b\uff1a\u201cour commitment and expertise in providing a secure environment for our high profile clients has been the motivation behind all the effort to get us through this certification process. We at PCT believe that our leading edge technology is a pioneer in providing a simple, affordable and yet user-friendly solution at all levels of the security chain.\u201d\uff09<\/p>\n\n\n\n \u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u662f\u8fdb\u884c\u7b26\u5408FIPS 140-2\u6807\u51c6\u7684\u5bc6\u7801\u6a21\u5757\u4e00\u81f4\u6027\u6d4b\u8bd5\u7684\u5fc5\u8981\u6761\u4ef6\u3002\u6240\u6709\u6d4b\u8bd5\u90fd\u5fc5\u987b\u7531\u88ab\u7ecf\u8fc7\u8ba4\u53ef\u7684\u7b2c\u4e09\u65b9\u5b9e\u9a8c\u5ba4\uff0c\u4e5f\u5373\u5bc6\u7801\u6a21\u5757\u6d4b\u8bd5\uff08Cryptographic Module Testing\uff0cCMT\uff09\u5b9e\u9a8c\u5ba4\u8fdb\u884c\u3002atsec\u4fe1\u606f\u5b89\u5168\uff0c\u4f5c\u4e3a\u88ab\u8ba4\u53ef\u7684CMT\u5b9e\u9a8c\u5ba4\uff0c\u5728\u4fe1\u606f\u5b89\u5168\u8bc4\u4f30\u548c\u4fe1\u606f\u5b89\u5168\u76f8\u5173\u4ea7\u54c1\u6d4b\u8bd5\u65b9\u9762\u5177\u6709\u5168\u7403\u6027\u7684\u6210\u529f\u7ecf\u9a8c\uff0c\u81ea\u7136\u6210\u4e3a\u4e86\u76ae\u5c14\u68ee\u7684\u9009\u62e9\u3002Steve Weingart\uff0catsec\u8d44\u6df1\u987e\u95ee\uff0c\u6b64\u9879\u76ee\u7684\u6d4b\u8bd5\u4eba\u5458\uff0c\u8868\u793a\uff1a\u201c\u901a\u8fc7\u5bf9\u4ed6\u4eec\u5bc6\u7801\u7b97\u6cd5\u7684\u72ec\u7acb\u6d4b\u8bd5\u548c\u9a8c\u8bc1\u8fc7\u7a0b\uff0c\u76ae\u5c14\u68ee\u5c55\u793a\u4e86\u4ed6\u4eec\u81f4\u529b\u4e8e\u4e3a\u4ed6\u4eec\u7684\u4ea7\u54c1\u6ee1\u8db3\u66f4\u9ad8\u7684\u8d28\u91cf\u548c\u4e92\u64cd\u4f5c\u6027\u6807\u51c6\u3002\u76ee\u524d\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5\u5df2\u7ecf\u5b8c\u6210\uff0c\u6211\u4eec\u5c06\u7ee7\u7eed\u8fdb\u884cFIPS 140-2\u4e00\u81f4\u6027\u6d4b\u8bd5\u5e76\u4e14\u671f\u5f85\u7740\u6210\u529f\u9a8c\u8bc1\u3002\u201d\uff08\u539f\u6587\u5982\u4e0b\uff1a\u201cBy going through the process of independent testing and validation of their cryptographic algorithm implementations, Pierson has shown that they are committed to meeting a higher quality and interoperability standard for their products. Now that the cryptographic algorithm tests are completed, we are continuing to move forward on the FIPS 140-2 conformance testing and looking forward to a successful validation.\u201d\uff09<\/p>\n\n\n\n