AES-NI Validation

WinMagic has a long and successful history of data encryption – pretty sure I’ve said this before. One of the key things we work to ensure is compliance and certification with things such as the Cryptographic Module Validation Program (CMVP) which is managed by the National Institute of Standards and Technology (NIST).

If you’re not familiar with the CMVP here’s an explanation taken directly from their site:

The National Institute of Standards and Technology (NIST) established the Cryptographic Module Validation Program (CMVP) that validates cryptographic modules to Federal Information Processing Standards (FIPS)140-1 Security Requirements for Cryptographic Modules, and other FIPS cryptography based standards. The CMVP is a joint effort between NIST and the Communications Security Establishment Canada (CSEC). FIPS 140-2, Security Requirements for Cryptographic Modules, was released on May 25, 2001 and supersedes FIPS 140-1.

Modules validated as conforming to FIPS 140-1 and FIPS 140-2 are accepted by the Federal Agencies of both countries for the protection of sensitive information.

We were the first encryption vendor meet the Advanced Encryption Standard Algorithm Validation requirement, you can see our certification here – note that it’s Certificate #1. Of course, we also ensured our cryptographic engines in the past have met FIPS 140-1 and 140-2 requirements.

With the release of SecureDoc 6.1, we introduced a new AES-NI cryptographic engine. We’ve been anxiously awaiting the finalization of our FIPS 140-2 process review and last week we received word that our new cryptographic engine received NIST approval.

Now customers can rest assured SecureDoc 6.1 is fully 140-2 compliant. Our Windows certificate number is 1880 and our Mac OS X certificate number is 1881.

Previous Post
Constant Improvement
Next Post
Happy Valentine’s Day! Why Marketers Love Data Encryption!

Related Posts

Keep Moving Forward

November marks the beginning of a new fiscal year for WinMagic which means we’ve been doing a lot of ‘reflection’ internally as to what we’ve done over the past year and how we’ve succeeded. That of course, is in our…

Exiting out the backdoor

In late December it was revealed that RSA allegedly implemented flawed encryption technology to enable an NSA back door into its tokens. As a result of this, a few key speakers at this year’s RSA 2014 conference are backing out of…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
 
Contact Us
 

This will close in 0 seconds