Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Cryptographic module

Abbreviation(s) and Synonym(s): Definition(s):

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See [FIPS 140].
Source(s):
NIST SP 800-133

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms), holds plaintext keys and uses them for performing cryptographic operations, and is contained within a cryptographic module boundary. This Profile requires the use of a validated cryptographic module as specified in [FIPS 140].
Source(s):
NIST SP 800-152

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 4

  A cryptographic module whose keys and/or metadata have been subjected to unauthorized access, modification, or disclosure while contained within the cryptographic module.
Source(s):
NIST SP 800-152 under Cryptographic module (compromised)

  See Cryptographic module.
Source(s):
NIST SP 800-133 under Module

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded]

  The set of hardware, software, and/or firmware that implements Approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Source(s):
NIST SP 800-57 Part 2 under Cryptographic module

  The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-32 under Cryptographic Module (FIPS 140-1)

  A set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation).
Source(s):
NIST SP 800-63-3 under Cryptographic Module

  an embedded software component of a product or application, or a complete product in-and-of-itself that has one or more capabilities.
Source(s):
NISTIR 7511 Rev. 4 under Module