Cryptographic Hardware Security Modules
Nicko van Someren, nCipher Plc., UK
The Need for Hardware Security Modules
Limitations of Software Security
General-Purpose Operating Systems versus Security Kernels
Physical Security Considerations
Side-Channel Attack Resistance
Authenticating Users to an HSM
Application Programming Interfaces
Public Key Infrastructure-Focused HSMs
Trusted Platform Modules and the Trusted Computing Group
INTRODUCTION
Previously we have seen how cryptography can be used to secure information in computer systems and networks. Encryption with a symmetric cipher can allow data at rest on a computer disc to be protected against those who do not have the key. Encryption with public key ciphers allow data to be sent across a network by any party such that only the designated recipient can make use of it. Message authentication codes can be used to detect when data have been altered and digital signatures can be used to check ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.