Parte de un
equipo de cifra electrónico, en general con protecciones físicas y lógicas, que
contiene la implementación del algoritmo y/o las memorias de claves.
[CESID:1997]
(I) A set of hardware,
software, firmware, or some combination thereof that implements cryptographic
logic or processes, including cryptographic algorithms, and is contained within
the module's "cryptographic boundary", which is an explicitly defined
contiguous perimeter that establishes the physical bounds of the module. [FP140] [RFC4949:2007]
The set of hardware,
software, and/or firmware that implements Approved security functions
(including cryptographic algorithms and key generation) and is contained within
the cryptographic boundary. [NIST-SP800-57:2007]
The set of hardware,
software, and/or firmware that implements security functions and are contained
within the cryptographic boundary.
cryptographic boundary.
an explicitly defined continuous perimeter that establishes the physical and/or
logical bounds of a cryptographic module and contains all the hardware,
software, and/or firmware components of a cryptographic module.
[ISO-19790:2006]
the set of hardware,
software, and/or firmware that implements Approved security functions
(including cryptographic algorithms and key generation) and is contained within
the cryptographic boundary. [FIPS-140-2:2001]