Tamper Protection
The tamper evidence, resistance, and response – tamper protection – are the key and major differences HSMs have from usual server computers acting as cryptographic accelerators.
Whereas there are some standards covering security requirements for cryptographic modules, the most widely accepted (both as customers’ choice and government requests) is the NIST FIPS 140-2.
Read more about this topic: Hardware Security Module
Famous quotes containing the word protection:
“Guns have metamorphosed into cameras in this earnest comedy, the ecology safari, because nature has ceased to be what it always had beenwhat people needed protection from. Now nature tamed, endangered, mortalneeds to be protected from people.”
—Susan Sontag (b. 1933)
Related Phrases
Related Words