August 25-28, 2020 | Hyatt Regency Bethesda, Maryland, USA

Spoofing a Hardware Security Module (I21c)

30 Apr 2020
12:00-12:30
Congressional/Old Georgetown Room

Spoofing a Hardware Security Module (I21c)

This talk compares valid key management techniques using a cryptographic hardware security module (HSM) with commonly used untrustworthy software-based crypto methods that basically spoof the HSM. Two hardware-based techniques are contrasted with three hybrid-based methods. Security issues for the software-based methods are discussed, and an alternative standards-based scheme is introduced.