The IT Law Wiki
Line 3: Line 3:
 
A '''cryptographic boundary''' is
 
A '''cryptographic boundary''' is
   
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], [[FIPS 140-1]], at 13.</ref>}}
+
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}}
   
 
== References ==
 
== References ==

Revision as of 02:52, 1 October 2013

Definition

A cryptographic boundary is

an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1]

References

  1. Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.