U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Module

Abbreviation(s) and Synonym(s):

Definition(s):

  See Cryptographic module.
Source(s):
NIST SP 800-133 Rev. 2

  The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-175B Rev. 1 under Cryptographic module

  The set of hardware, software, and/or firmware that implements approved cryptographic functions (including key generation) that are contained within the cryptographic boundary of the module.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptographic module

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms), holds plaintext keys and uses them for performing cryptographic operations, and is contained within a cryptographic module boundary. This Profile requires the use of a validated cryptographic module as specified in [FIPS 140].
Source(s):
NIST SP 800-152 under Cryptographic module

  The set of hardware, software, and/or firmware that implements approved security functions and is contained within a cryptographic boundary.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Cryptographic module

  The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and keygeneration methods) and is contained within a cryptographic module boundary. See FIPS 140.
Source(s):
NIST SP 800-133 Rev. 2 under Cryptographic module

  an embedded software component of a product or application, or a complete product in-and-of-itself that has one or more capabilities.
Source(s):
NISTIR 7511 Rev. 4