A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic boundary

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
CNSSI 4009-2015 ISO/IEC 19790

  An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s):
NIST SP 800-20 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 3 under Cryptographic boundary [Superseded]

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1 under Cryptographic boundary