Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Hardware security

From Wikipedia, the free encyclopedia
Security architecture implemented in hardware

Hardware security is a discipline originated from the cryptographic engineering and involveshardware design,access control,secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.[1][2][3][4]

Ahardware security module (HSM) is a physical computing device that safeguards and managesdigital keys for strong authentication and providescryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to acomputer ornetwork server.

Some providers in this discipline consider that the key difference between hardware security andsoftware security is that hardware security is implemented using "non-Turing-machine" logic (rawcombinatorial logic orsimple state machines). One approach, referred to as "hardsec", usesFPGAs to implement non-Turing-machine security controls as a way of combining the security of hardware with the flexibility of software.[5]

Hardware backdoors arebackdoors inhardware. Conceptionally related, ahardware Trojan (HT) is a malicious modification ofelectronic system, particularly in the context ofintegrated circuit.[1][3]

Aphysical unclonable function (PUF)[6][7] is a physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict. Further, an individual PUF device must be easy to make but practically impossible to duplicate, even given the exact manufacturing process that produced it. In this respect it is the hardware analog of aone-way function. The name "physical unclonable function" might be a little misleading as some PUFs are clonable, and most PUFs are noisy and therefore do not achieve the requirements for afunction. Today, PUFs are usually implemented inintegrated circuits and are typically used in applications with high security requirements.

Many attacks on sensitive data and resources reported by organizations occur from within the organization itself.[8]

See also

[edit]

References

[edit]
  1. ^abMukhopadhyay, Debdeep; Chakraborty, Rajat Subhra (2014).Hardware Security: Design, Threats, and Safeguards. CRC Press.ISBN 9781439895849. Retrieved3 June 2017.
  2. ^"Hardware security in the IoT - Embedded Computing Design".embedded-computing.com.Archived from the original on 18 June 2017. Retrieved3 June 2017.
  3. ^abRostami, M.; Koushanfar, F.; Karri, R. (August 2014). "A Primer on Hardware Security: Models, Methods, and Metrics".Proceedings of the IEEE.102 (8):1283–1295.doi:10.1109/jproc.2014.2335155.ISSN 0018-9219.S2CID 16430074.
  4. ^Rajendran, J.; Sinanoglu, O.; Karri, R. (August 2014)."Regaining Trust in VLSI Design: Design-for-Trust Techniques".Proceedings of the IEEE.102 (8):1266–1282.doi:10.1109/jproc.2014.2332154.ISSN 0018-9219.
  5. ^Cook, James (2019-06-22)."British start-ups race ahead of US rivals to develop new ultra-secure computer chips to defeat hackers".The Telegraph.ISSN 0307-1235.Archived from the original on 2019-06-28. Retrieved2019-08-27.
  6. ^Sadeghi, Ahmad-Reza; Naccache, David (2010).Towards Hardware-Intrinsic Security: Foundations and Practice. Springer Science & Business Media.ISBN 9783642144523. Retrieved3 June 2017.
  7. ^"Hardware Security - Fraunhofer AISEC".Fraunhofer-Institut für Angewandte und Integrierte Sicherheit (in German).Archived from the original on 4 December 2020. Retrieved3 June 2017.
  8. ^"Hardware Security".web.mit.edu. Archived fromthe original on 22 May 2017. Retrieved3 June 2017.

External links

[edit]


Note: This template roughly follows the 2012ACM Computing Classification System.
Hardware
Computer systems organization
Networks
Software organization
Software notations andtools
Software development
Theory of computation
Algorithms
Mathematics ofcomputing
Information systems
Security
Human-centered computing
Concurrency
Artificial intelligence
Machine learning
Graphics
Applied computing
Specialized PlatformDevelopment
Retrieved from "https://en.wikipedia.org/w/index.php?title=Hardware_security&oldid=1316913386"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp