HSM offers a high level of key security
Abstract
Cryptography is the art and science of keeping message secure, it has become an essential part of everyday life in today's electronic world. Hardware-based cryptography is more fast and more security than software cryptography. The algorithm and all private keys are kept secure in the protected memory of a tamper-resistant device, commonly referred to as a hardware security module (HSM) It will prevent the key from being stolen and used elsewhere. That means HSMs provide secure management of private keys in that the keys never leave the module unencrypted. The RSA Keon KRM featuring a hardware-based key generation process through a Hardware Security Module (HSM) is an example to show how the HSMs offer a more secure key generation technique than software based generation. However, the cost of HSM is very high and its API is still in its infancy, there still has room for HSM to consummate.
Outline
1. Introduction:
The importance of the cryptography
Compare hardware cryptography and software cryptography
Conclusion and short introduction of next sections
2 Cryptography
What is the cryptography
What is public key cryptography
1) public key
2) private key
3) the main idea of public key cryptography
3 RSA
What is RSA
How RSA cryptography works
What is the key storage
What is key recovery
4. HSM offers high level of key security
Keys are vulnerable to a range of threats: key duplication, key substitution, key modification
HSM meets the cryptography needs
RSA Keon KRM featuring a hardware-based key generation process through a Hardware Security Module (HSM)
Conclusion
5. The limits of HSM
High cost
Infancy API
6.Summary
Compare with software cryptography, hardware cryptography has many merits. But it has till some limitations.
7.Reference