U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic boundary

Definition(s):

  Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
CNSSI 4009-2015 from ISO/IEC 19790

  An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s):
NIST SP 800-20 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-175B Rev. 1 under Cryptographic boundary
NIST SP 800-57 Part 2 Rev.1 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev. 2 under Cryptographic boundary

  An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Cryptographic boundary