U.S. flag   An official website of the United States government
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic boundary

Definition(s):

  Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
CNSSI 4009-2015 from ISO/IEC 19790

  An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s):
NIST SP 800-20 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 5 under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptographic boundary
NIST SP 800-175B Rev. 1 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Cryptographic boundary