Q:Why do you need source code to perform the evaluation?
We need to independently review the source code to be confident in the implementation and architecture of the cryptographic security. Providing source code usually expedites the evaluation.
We undertake formal independent assessment of ICT security products (both hardware and software) to make sure they meet our standards. What our evaluations provide Our Evaluated Products List (EPL) …Programs
The Cryptographic evaluation process generally takes several months. This timeframe is separate to the time taken for the AISEP evaluation. The time taken depends on the level of vendor cooperation …Faqs