{"id":4168,"date":"2009-07-15T04:07:00","date_gmt":"2009-07-15T02:07:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=4168"},"modified":"2024-08-13T04:13:54","modified_gmt":"2024-08-13T02:13:54","slug":"atsec-pierson-miikoo-cavp-2009","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-pierson-miikoo-cavp-2009\/","title":{"rendered":"atsec\u5b8c\u6210\u76ae\u5c14\u68eeMIIKOO \u5bc6\u7801\u7b97\u6cd5\u8bc4\u6d4b"},"content":{"rendered":"\n
\u4e2d\u56fd\uff0c\u5317\u4eac <\/strong>– \u8fd1\u65e5\uff0c\u827e\u7279\u8d5b\u514b\uff08atsec\uff09\u4fe1\u606f\u5b89\u5168\u5b8c\u6210\u4e86\u76ae\u5c14\u68ee\uff08Pierson Capital Technology\uff09\u7684MIIKOO\u4ea7\u54c1\u4e0a\u5b9e\u73b0\u7684\u5bc6\u7801\u7b97\u6cd5\u7684\u6d4b\u8bc4\u3002\u672c\u6b21\u6d4b\u8bc4\u5305\u62ec\u901a\u8fc7\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u548c\u6280\u672f\u5b66\u4f1a\uff08NIST: National Institute of Standards and Technology\uff09\u6240\u7ef4\u62a4\u7684\u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u4f53\u7cfb\uff08CAVP: Cryptographic Algorithm Validation Program\uff09\u9a8c\u8bc1\u7684\u4e24\u4e2aFIPS\u8ba4\u53ef\u7684\u5bc6\u7801\u7b97\u6cd5\uff0c\u540c\u65f6\u5305\u62ec\u4e24\u4e2a\u975eFIPS\u8ba4\u53ef\u7684\u5bc6\u7801\u7b97\u6cd5\u2014HOTP\u548cCRC-32\u3002atsec\u5728\u8fd9\u4e24\u4e2a\u7b97\u6cd5\u4e0a\u6267\u884c\u4e86\u6e90\u4ee3\u7801\u5ba1\u6838\u548c\u72ec\u7acb\u6d4b\u8bc4\u3002<\/p>\n\n\n\n NIST\u8ba4\u8bc1\u9a8c\u8bc1\u4e86MIKOO\u4e2d\u6240\u5b9e\u73b0\u7684\u7b97\u6cd5\u7684\u6b63\u786e\u6027\u3002\u76ae\u5c14\u68eeCTO Frank Psaila\u5148\u751f\u8868\u793a\uff1a\u201c\u6211\u4eec\u7684\u4f7f\u547d\u548c\u7ecf\u9a8c\u4e3a\u6211\u4eec\u7684\u5ba2\u6237\u63d0\u4f9b\u4e86\u4e00\u4e2a\u5b89\u5168\u7684\u73af\u5883\uff0c\u5e76\u5f88\u597d\u5730\u63a8\u52a8\u6211\u4eec\u901a\u8fc7\u8fd9\u9879\u8ba4\u8bc1\u3002\u6211\u4eec\u767e\u5206\u767e\u4fe1\u4efb\u6211\u4eec\u4ea7\u54c1\u7684\u7406\u5ff5\uff0c\u56db\u5e74\u7684\u52aa\u529b\u6211\u4eec\u5fc5\u5c06\u5f97\u5230\u56de\u62a5\u3002\u201d\uff08\u82f1\u6587\u539f\u6587\u5982\u4e0b\uff1aOur commitment and expertise to provide a secure environment for our clients has been the best driver to get us through this certification process. We at PCT believed in this product from its conception and four years later we’re getting back the results of all our efforts.\uff09<\/p>\n\n\n\n \u5bc6\u7801\u7b97\u6cd5\u9a8c\u8bc1\u662f\u57fa\u4e8eFIPS 140-2\u6807\u51c6\u7684\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u4f53\u7cfb\uff08CMVP: Cryptographic Module Validation Program\uff09\u7684\u5148\u51b3\u6761\u4ef6\u3002\u6240\u6709\u7684NIST\u8ba4\u53ef\u7684\u7b97\u6cd5\u6d4b\u8bc4\u5de5\u4f5c\u5fc5\u987b\u7531\u7ecf\u8fc7\u6388\u6743\u7684\u4e2d\u7acb\u7b2c\u4e09\u65b9\u7684\u5bc6\u7801\u5b89\u5168\u6d4b\u8bc4\u5b9e\u9a8c\u5ba4\uff08CST: Cryptographic and Security Testing\uff09\u5f00\u5c55\u3002atsec\u4fe1\u606f\u5b89\u5168\u4f5c\u4e3a\u88ab\u6388\u6743\u7684\u5bc6\u7801\u5b89\u5168\u6d4b\u8bc4\u5b9e\u9a8c\u5ba4\uff0c\u540c\u65f6\u5728\u4fe1\u606f\u5b89\u5168\u4ea7\u54c1\u7684\u8bc4\u4f30\u548c\u6d4b\u8bc4\u9886\u57df\u5185\u62e5\u6709\u4e30\u5bcc\u7684\u56fd\u9645\u7ecf\u9a8c\uff0c\u5f88\u81ea\u7136\u7684\u6210\u4e3a\u76ae\u5c14\u68ee\u8fdb\u884c\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bc4\u7684\u9009\u62e9\u3002atsec\u7684\u8d44\u6df1\u987e\u95ee\u548c\u672c\u9879\u76ee\u6d4b\u8bc4\u5e08Steve Weingart\u8868\u793a\uff1a\u201c\u901a\u8fc7\u72ec\u7acb\u7684\u6d4b\u8bd5\u548c\u5bc6\u7801\u5b9e\u73b0\u7684\u9a8c\u8bc1\u8fc7\u7a0b\uff0c\u76ae\u5c14\u68ee\u5c55\u793a\u4e86\u4ed6\u4eec\u81f4\u529b\u4e8e\u6ee1\u8db3\u4ea7\u54c1\u7684\u9ad8\u8d28\u91cf\u548c\u6807\u51c6\u4e92\u901a\u6027\u3002\u201d\uff08\u82f1\u6587\u539f\u6587\u5982\u4e0b\uff1aBy going through the process of independent testing and validation of their cryptographic implementations, Pierson has shown that they are committed to meeting a higher quality and interoperability standard for their products.\uff09<\/p>\n\n\n\n