Cryptographic Module definition

Cryptographic Module means a set of hardware, software and/or firmware that is Separated from all other Systems and that is designed for:
Cryptographic Module means secure software, device or utility that (i) generates Key Pairs; (ii) stores cryptographic information; and/or (iii) performs cryptographic functions.
Cryptographic Module. The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module. [NIST FIPS 140-3].

Examples of Cryptographic Module in a sentence

  • On July 17, 1995, the National Institute of Standards and Technology (NIST) established the Cryptographic Module Validation Program (CMVP) that validates cryptographic modules to Federal Information Processing Standards (FIPS) cryptography-based standards.

  • The Contractor shall use Federal Information processing Standard (FIPS) 140-2- compliant encryption (Security) Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission.

  • The Contractor shall use Federal Information processing Standard (FIPS) 140-2-compliant encryption (Security) Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission.

  • Only the version numbers listed in the Cryptographic Module column of the CMVP list are FIPS validated and only when run on the operating systems listed in the Level/Description column.

  • FIPS 140-2 validation can be determined online through the Cryptographic Module Validation Program Search, with information about the Cryptographic Module Validation Program under FIPS 140-2.

  • N/A Yes Both IA-7 Cryptographic Module Authentication The information system uses mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

  • All APS Data stored by Contractor shall be protected with a data-at-rest encryption product utilizing a validated FIPS 140-2 Cryptographic Module with a 128-bit key or higher.

  • Compromise A violation of the security of a system such that unauthorised disclosure of sensitive information may have occurred, e.g. if there has been unauthorised access to the Cryptographic Module in which a Private Key is stored or used, or unauthorised access to or loss or theft of media on which the Private Key is stored.

  • The requirements for cryptographic modules formulated in FIPS 140-2 are the foundation of the Canadian / U.S. the Cryptographic Module Validation Program (CMVP).

  • Cryptographic Module A Cryptographic Module is hardware, software or firmware or any combination of them which uses Cryptography to protect the information stored therein.


More Definitions of Cryptographic Module

Cryptographic Module means secure software, device or utility that (i) generates Key Pairs; (ii) stores cryptographic information; and/or (iii) performs cryptographic functions. “Digital Certificate” means a digital identifier within the SG Public Key Infrastructure that: (i) identifies the Issuing Certification Authority; (ii) identifies the Holder; (iii) contains the Holder's Public and Private Keys; (iv) specifies the Digital Certificate's Operational Term; (v) is digitally signed by the Issuing Certification Authority; and (vi) has prescribed Key Usages and Reliance Factor that governs its issuance and use whether expressly included or incorporated by reference to this CP/CPS.

Related to Cryptographic Module

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Electronic device technology means a technology involving

  • Module means specific portion of the Application Software designated as such in the Documentation made available to the Customer under the Notification Form.

  • Modules means the Base Modules and Extended Modules.

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Devices means (whether physical or virtual) a server, system, workstation, computer, mobile device, or end point upon which or through which the Services are used and/or on which the Software is installed.

  • Device means each of a computer, workstation, terminal, handheld PC, pager, telephone, personal digital assistant, “smart phone,” server or any other hardware where software can be installed that would allow End User to interact with the Product.

  • Tool means the tool developed in accordance with Section 35A-15-303.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Computer software documentation means owner's manuals, user's manuals, installation instructions, operating instructions, and other similar items, regardless of storage medium, that explain the capabilities of the computer software or provide instructions for using the software.

  • Catalog means the available list of tangible personal property or services, in the most current listing, regardless of date, during the life of the contract, that takes the form of a catalog, price list, schedule, shelf price or other form that:

  • Digital Cross Connect System or "DCS" is a function which provides automated Cross Connection of Digital Signal Level 0 (DS0) or higher transmission bit rate digital channels within physical interface facilities. Types of DCS include but are not limited to DCS 1/0s, DCS 3/1s, and DCS 3/3s, where the nomenclature 1/0 denotes interfaces typically at the DS1 rate or greater with Cross Connection typically at the DS0 rate. This same nomenclature, at the appropriate rate substitution, extends to the other types of DCS specifically cited as 3/1 and 3/3. Types of DCS that cross connect Synchronous Transport Signal level 1 (STS-1 s) or other Synchronous Optical Network (SONET) signals (e.g., STS-3) are also DCS, although not denoted by this same type of nomenclature. DCS may provide the functionality of more than one of the aforementioned DCS types (e.g., DCS 3/3/1 which combines functionality of DCS 3/3 and DCS 3/1). For such DCS, the requirements will be, at least, the aggregation of requirements on the "component" DCS. In locations where automated Cross Connection capability does not exist, DCS will be defined as the combination of the functionality provided by a Digital Signal Cross Connect (DSX) or Light Guide Cross Connect (LGX) patch panels and D4 channel banks or other DS0 and above multiplexing equipment used to provide the function of a manual Cross Connection. Interconnection is between a DSX or LGX to a Switch, another Cross Connection, or other service platform device.

  • Diagnostic source assembly means the tube housing assembly with a beam-limiting device attached.

  • Firmware means software sold or licensed only in conjunction with machines, designed for execution only on a machine with which it is provided, designed only for machines other than a dedicated computer, and embedded into or installed on the machine by the machine’s manufacturer or seller.

  • Technology means any and all technical information, specifications, drawings, records, documentation, works of authorship or other creative works, ideas, algorithms, models, databases, ciphers/keys, systems architecture, network protocols, research, development, and manufacturing information, software (including object code and source code), application programming interfaces (APIs), innovations, mask works, logic designs, circuit designs, technical data, processes and methods.

  • Server Software means software that provides services or functionality on a computer acting as a server.

  • System Software means Software that provides the operating and management instructions for the underlying hardware and other components, and is identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Systems Software. Such System Software includes, but is not restricted to, micro-code embedded in hardware (i.e., “firmware”), operating systems, communications, system and network management, and utility software.

  • Software means any and all computer programs, including any and all software implementations of algorithms, models and methodologies, whether in source code or object code; databases and compilations, including any and all data and collections of data, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing, screens, user interfaces, report formats, firmware, development tools, templates, menus, buttons and icons; and all documentation including user manuals and other training documentation related to any of the foregoing.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.