A cryptographic module whose keys and/or metadata have been subjected to unauthorized access, modification, or disclosure while contained within the cryptographic module.
Source(s):
NIST SP 800-152
under Cryptographic module (compromised)
A set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation).
Source(s):
NIST SP 800-63-3
under Cryptographic Module
The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Source(s):
NIST SP 800-53 Rev. 5
from
FIPS 140-3
The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-32
[Withdrawn]
under Cryptographic Module
from
FIPS 140-1