The Workflow and The Whack—Implementing On-HSM Custom Firmware (C32c)
The market has two use-cases for writing custom firmware for a hardware security module — Converting a multi-operation workflow on the host to a single transaction on the HSM, and/or implementing some whack (weird, unusual, crazy) off-the-wall IETF draft, or legacy cryptographic idea or algorithm, inside the FIPS boundary of the HSM.
The speaker will discuss the above, concentrating on what things to consider when investigating a conversion of your workflow and algorithms, how this impacts the FIPS certifications involved, and techniques available to optimize around the implementation details.
A cost-benefit analysis will also be presented, in both financial cost and network latency benefits.