Hardware Security Module - Tamper Protection

Tamper Protection

The tamper evidence, resistance, and response – tamper protection – are the key and major differences HSMs have from usual server computers acting as cryptographic accelerators.

Whereas there are some standards covering security requirements for cryptographic modules, the most widely accepted (both as customers’ choice and government requests) is the NIST FIPS 140-2.

Read more about this topic:  Hardware Security Module

Famous quotes containing the word protection:

    Ah! how much a mother learns from her child! The constant protection of a helpless being forces us to so strict an alliance with virtue, that a woman never shows to full advantage except as a mother. Then alone can her character expand in the fulfillment of all life’s duties and the enjoyment of all its pleasures.
    Honoré De Balzac (1799–1850)