Cryptographic Boundary

Cryptographic Boundary definition in Computer Security terms:

Acronym(s): None

Definition(s): An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s): FIPS 140-2

Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s): CNSSI 4009-2015 (ISO/IEC 19790)

An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s): NIST SP 800-20

An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s): NIST SP 800-57 Part 1 Rev. 3

An explicitly-defined perimeter that establishes the boundary of all components of a cryptographic module.
Source(s): NIST SP 800-130

Synonym(s): None

 

reference: CSRC Glossary