Hardware Security Module - Tamper Protection

Tamper Protection

The tamper evidence, resistance, and response – tamper protection – are the key and major differences HSMs have from usual server computers acting as cryptographic accelerators.

Whereas there are some standards covering security requirements for cryptographic modules, the most widely accepted (both as customers’ choice and government requests) is the NIST FIPS 140-2.

Read more about this topic:  Hardware Security Module

Famous quotes containing the word protection:

    Guns have metamorphosed into cameras in this earnest comedy, the ecology safari, because nature has ceased to be what it always had been—what people needed protection from. Now nature tamed, endangered, mortal—needs to be protected from people.
    Susan Sontag (b. 1933)