Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Cryptographic module

Abbreviation(s) and Synonym(s): Definition(s):

  The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-32 under Cryptographic Module (FIPS 140-1)

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See [FIPS 140].
Source(s):
NIST SP 800-133

  See Cryptographic module.
Source(s):
NIST SP 800-133 under Module

  A cryptographic module whose keys and/or metadata have been subjected to unauthorized access, modification, or disclosure while contained within the cryptographic module.
Source(s):
NIST SP 800-152 under Cryptographic module (compromised)

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 4

  A set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation).
Source(s):
NIST SP 800-63-3 under Cryptographic Module

  The set of hardware, software, and/or firmware that implements approved cryptographic functions (including key generation) that are contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-57 Part 2 Rev.1

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Source(s):
NIST SP 800-57 Part 2
NIST SP 800-57 Part 1 Rev. 3 [Superseded]

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1

  See Cryptographic module
Source(s):
NIST SP 800-133 Rev.1 under Module

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms), holds plaintext keys and uses them for performing cryptographic operations, and is contained within a cryptographic module boundary. This Profile requires the use of a validated cryptographic module as specified in [FIPS 140].
Source(s):
NIST SP 800-152

  an embedded software component of a product or application, or a complete product in-and-of-itself that has one or more capabilities.
Source(s):
NISTIR 7511 Rev. 4 under Module