There are similar sections for all other validated cryptographic modules. #2024) FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. The version number of the installed binary is found by right-clicking the module file and clicking on the Version or Details tab. #72; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #3653; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. This document is broken into seven major sections: FIPS 140 Overview – Provides an overview of the FIPS 140 standard as well as provides some historical information about the standard. Microsoft Product Validation (Information for Procurement Officers and Auditors) – Provides information on how Microsoft products are FIPS 140 validated. The goal of this section is to provide an overview of the Microsoft developed products and modules and explain how the validated cryptographic modules are used. #576); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert.
FIPS 140 is a US government and Canadian government standard that defines a minimum set of the security requirements for products that implement cryptography. #289); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. System Integrator – Responsible for ensuring that Microsoft Products are configured properly to use only FIPS 140 validated cryptographic modules. Software Developer – Responsible for building software products that utilize Microsoft FIPS 140 validated cryptographic modules. Subsequently, many Windows components and Microsoft products are built to rely on the Cryptographic API: Next Generation (CNG) and legacy Cryptographic API (CAPI) FIPS 140 validated cryptographic modules. Windows components and Microsoft products use the documented application programming interfaces (APIs) for each of the modules to access various cryptographic services.