Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic boundary

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
CNSSI 4009-2015 (ISO/IEC 19790)

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Cryptographic boundary [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Cryptographic boundary

  An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s):
NIST SP 800-20 under Cryptographic boundary