The capability provided by the system or a system element. The capability may be expressed generally as a concept or specified precisely in requirements.
Sources:
NIST SP 800-160 Vol. 2 Rev. 1
NIST SP 800-160v1r1
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block cipher algorithms, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators. See FIPS 140.6
Sources:
NIST SP 800-175B Rev. 1
under Security function
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block ciphers, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators. See FIPS 140.
Sources:
NIST SP 800-57 Part 1 Rev. 5
under Security function
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block ciphers, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators; see FIPS 140.
Sources:
NIST SP 800-133 Rev. 2
under Security function