Cryptographic Module Security Policy: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
A specification of the security rules under which a cryptographic module is designed to operate.
Source: NIST SP 800-152 | Category: