Cryptographic module: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
The set of hardware, software, and/or firmware that implements security functions (including cryptographic algorithms and key generation) and is contained within a cryptographic module boundary. See [FIPS 140].
Source: NIST SP 800-133 | Category: