Hardware security

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design , access control , secure multi-party computation , secure key storage, assurance code authenticity, measures to ensure that the supply chain is secure. [1] [2] [3] [4]

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing . These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server .

Hardware backdoors are backdoors in hardware . Conceptionally related, a hardware Trojan (HT) is a malicious modification of an electronic system , particularly in the context an integrated circuit . [1] [3]

A physical unclonable function (PUF) [5] [6] is a physical entity That Is embodied in a physical structure and is easy to evaluate-but hard to predict. Further, an individual PUF device must be easy to make but practically impossible to duplicate, even given the exact manufacturing process that produced it. In this respect it is the analog hardware of a one-way function . The name “physical unclonable function” may be a little misleading as some PUFs are clonable, and most PUFs are noisy and therefore do not achieve the requirements for a function . Today, PUFs are typically implemented in integrated circuits and are typically used in applications with high security requirements.

Many attacks on sensitive data and resources reported by organizations within the organization. [7]

See also

  • Computer compatibility
    • Proprietary software
    • Free and open-source software
      • Comparison of open-source operating systems
      • Unified Extensible Firmware Interface § Secure boot
  • Trusted Computing
  • Computational trust
  • Fingerprint (computing)
  • Differential power analysis
  • Supply chain security
  • List of computer hardware manufacturers
  • Consumer protection


  1. ^ Jump up to:b Mukhopadhyay Debdeep; Chakraborty, Rajat Subhra (2014). Hardware Security: Design, Threats, and Safeguards . CRC Press. ISBN  9781439895849 . Retrieved 3 June 2017 .
  2. Jump up^ “Hardware Security in the IoT – Embedded Computing Design” . embedded-computing.com . Retrieved 3 June 2017 .
  3. ^ Jump up to:b Rostami, M .; Koushanfar, F .; Karri, R. (August 2014). “A Primer on Hardware Security: Models, Methods, and Metrics” . Proceedings of the IEEE . 102 (8): 1283-1295. doi : 10.1109 / jproc.2014.2335155 . ISSN  0018-9219 .
  4. Jump up^ Rajendran, J .; Sinanoglu, O .; Karri, R. (August 2014). “Regaining Trust in Design VLSI: Design-for-Trust Techniques” . Proceedings of the IEEE . 102 (8): 1266-1282. doi : 10.1109 / jproc.2014.2332154 . ISSN  0018-9219 .
  5. Jump up^ Sadeghi, Ahmad-Reza; Naccache, David (2010). Towards Hardware-Intrinsic Security: Foundations and Practice . Springer Science & Business Media. ISBN  9783642144523 . Retrieved 3 June 2017 .
  6. Jump up^ “Hardware Security – Fraunhofer AISEC” . Fraunhofer-Institut für Angewandte und Integrierte Sicherheit (in German) . Retrieved 3 June 2017 .
  7. Jump up^ “Hardware Security” . web.mit.edu . Retrieved 3 June 2017 .

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright computerforum.eu 2018
Shale theme by Siteturner