September 21-24, 2020 | Virtual Conference and Vendor Forum

Spoofing a Hardware Security Module (I22b)

22 Sep 2020
13:30-14:00

Spoofing a Hardware Security Module (I22b)

This talk compares valid key management techniques using a cryptographic hardware security module (HSM) with commonly used untrustworthy software-based crypto methods that basically spoof the HSM. Two hardware-based techniques are contrasted with three hybrid-based methods. Security issues for the software-based methods are discussed, and an alternative standards-based scheme is introduced.