The IT Law Wiki

Cryptographic boundary

32,296pages on
this wiki
Add New Page
Talk0 Share

Definitions Edit

A cryptographic boundary is

an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1]
a logical container where all the relevant security components of a control system that employ cryptography reside. It includes the processing hardware, data, and memory as well as other critical components.[2]

References Edit

  1. Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
  2. Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Also on Fandom

Random Wiki