U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Cryptographic module

Abbreviation(s) and Synonym(s):

Definition(s):

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See [FIPS 140].
Source(s):
NIST SP 800-133 [Superseded]

  See Cryptographic module.
Source(s):
NIST SP 800-133 [Superseded] under Module
NIST SP 800-133 Rev. 2 under Module

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded]
NIST SP 800-175B Rev. 1

  The set of hardware, software, and/or firmware that implements approved cryptographic functions (including key generation) that are contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-57 Part 2 Rev.1

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Source(s):
NIST SP 800-57 Part 2 [Superseded]
NIST SP 800-57 Part 1 Rev. 3 [Superseded]

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1 [Superseded]

  See Cryptographic module
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Module

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms), holds plaintext keys and uses them for performing cryptographic operations, and is contained within a cryptographic module boundary. This Profile requires the use of a validated cryptographic module as specified in [FIPS 140].
Source(s):
NIST SP 800-152

  The set of hardware, software, and/or firmware that implements approved security functions and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 5

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and keygeneration methods) and is contained within a cryptographic module boundary. See FIPS 140.
Source(s):
NIST SP 800-133 Rev. 2

  an embedded software component of a product or application, or a complete product in-and-of-itself that has one or more capabilities.
Source(s):
NISTIR 7511 Rev. 4 under Module