The IT Law Wiki
No edit summary
No edit summary
 
Line 3: Line 3:
 
A '''cryptographic module''' is
 
A '''cryptographic module''' is
   
{{Quote|the set of [[hardware]], [[software]], [[firmware]], or some combination thereof that implements [[cryptographic logic]] or [[cryptographic process]]es, including [[cryptographic algorithm]]s, and is contained within the [[cryptographic boundary]] of the module.<ref>[[NIST]], [[FIPS 140-1]], at 14.; [[NIST]], Introduction to Public Key Technology and the Federal PKI Infrastructure, Glossary, at 48 ([[NIST Special Publication 800-32]]) (Feb. 26, 2001) ([http://csrc.nist.gov/publications/nistpubs/800-32/sp800-32.pdf full-text]).</ref>}}
+
{{Quote|the set of [[hardware]], [[software]], [[firmware]], or some combination thereof that implements [[cryptographic logic]] or [[cryptographic process]]es, including [[cryptographic algorithm]]s, and is contained within the [[cryptographic boundary]] of the module.<ref>[[NIST]], [[FIPS 140-1]], at 14; [[NIST Special Publication 800-32]], at 48.</ref>}}
   
 
== References ==
 
== References ==

Latest revision as of 02:53, 1 October 2013

Definition[]

A cryptographic module is

the set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or cryptographic processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module.[1]

References[]