An Overview of Hardware Security Modules
ثبت نشده
چکیده
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 standard and explain how it pertains to these devices.
منابع مشابه
An Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Improved RNS Reverse Converter in Three-Moduli Set
Residue Number System (RNS) is a carry-free and non-weighed integer system. In this paper an improved three-moduli set in reverse converter based on CRT algorithm is proposed. CRT algorithm can perform a better delay and hardware implementation in modules via other algorithms. This moduli is based on p that covers a wide range on modules and supports the whole range of its modules in dynamic r...
متن کاملSecurity Implications of Hardware vs. Software Cryptographic Modules
Cryptographic modules can be implemented either by hardware or by software. Whereas software implementations are known for being easier to develop and to maintain, when it comes to cryptographic modules or security-related applications in general, software implementations are significantly less secure than their hardware equivalents. The reason for this is mostly the fact that software solution...
متن کامل