A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2

Created June 01, 2001, Updated November 04, 2014