Retrieved from https://studentshare.org/information-technology/1648426-hardware-security-module-optimization
https://studentshare.org/information-technology/1648426-hardware-security-module-optimization.
In this study, an HSM optimization solution will then be proposed to fill the gaps identified. This document mainly aims to perform tests and obtain numeric figures that can be trusted in finding optimal points for the application of this solution in HSM devices of similar nature.4.1.General specification and capabilities A hardware security module (HSM) can be described as a cryptoprocessor that is dedicated and it is specifically designed to be used for the protection of the crypto key lifecycle.
Hardware security modules, therefore, act as trusted anchors that protect the infrastructure designed from cryptography and some of the organizations that are security-conscious in the world. This is achieved by managing, processing, and storing cryptographic keys securely inside a hardened and tamper-resistant device. [16] 155.1.Signature Service “The Spanish e-Identification board is currently working to upgrade the infrastructure for electronic identification in (Country Name), based on federated techniques using the SAML standard.
This infrastructure contains two important functions are to allow citizens to authenticate themselves securely and to electronically sign documents that represent transactions, agreements, applications and declarations of various forms and types. The signing service does not keep track of users and user keys, but simply generates a new signing key and signed certificate for each signature. This is a procedure that provides a number of important advantages such as 1)It reduces the amount of user sensitive information that needs to be stored in the server and hence, limits the amount of user sensitive information that can be stolen and abused.2) It provides proof of signing time as the certificate is generated at the singing time.3)The signature is always associated with a certificate that has sufficient remaining validity time for the intended use of the signed document.5)The certificate content can be adapted to the intended use of the signature such as whether the certified should contain a private or professional identity.”
...Download file to see next pages Read More