None
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block cipher algorithms, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators. See FIPS 140.6
Source(s):
NIST SP 800-175B Rev. 1
under Security function
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block ciphers, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators. See FIPS 140.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Security function
The capability provided by the system or a system element. The capability may be expressed generally as a concept or specified precisely in requirements.
Source(s):
NIST SP 800-160 Vol.2
NIST SP 800-160
[Superseded]