Accredited cryptographic algorithms and implementation


Explanation: Cryptographic algorithms that resist serious analysis are notoriously difficult to invent and to program correctly.

Vulnerabilities addressed: Addresses weaknesses in cryptographic algorithms and implementations.

Developer resources required: Requires access to expertly vetted cryptographic algorithms and implementations.

Evaluator resources required: Requires the ability to audit software for use with vetted cryptography or to automatically verify implemented cryptography against a vetted specification.