The IT Law Wiki
(Adding categories)
Line 3: Line 3:
 
A '''cryptographic boundary''' is
 
A '''cryptographic boundary''' is
   
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], Electronic Authentication Guideline 13 ([[NIST Special Publication 800-63]]) (Apr. 2006) ([http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf full-text]).</ref>}}
+
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], [[FIPS 140-1]], at 13.</ref>}}
   
 
== References ==
 
== References ==

Revision as of 06:03, 19 December 2010

Definition

A cryptographic boundary is

an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module.[1]

References

  1. NIST, FIPS 140-1, at 13.