膝盖疼痛是什么原因| 突然好想你你会在哪里是什么歌| 今年37岁属什么生肖| 什么不宁| 左肝钙化灶是什么意思| 干你什么事| 你的美丽让你带走是什么歌| 432是什么意思| 圆脸女生适合什么发型| 副教授是什么级别| 手术后吃什么鱼伤口愈合快| 什么是中成药| 眼睛有点模糊是什么原因| 真菌是什么原因引起的| 肚子特别疼是什么原因| 矜贵是什么意思| 大脑精神紊乱什么病| 时光荏苒的意思是什么| 三重一大是什么内容| 痛风能喝什么酒| 传媒公司是干什么的| 胆结石有什么治疗方法| 经常耳鸣是什么原因| 玉髓是什么玉| 什么作用| 什么时候开始数伏| 来月经前头痛什么原因| 尿蛋白定量是什么意思| 身体寒湿重吃什么好| 礼部尚书是什么官| 生吃苦瓜有什么好处和坏处| 上证指数是什么意思| 测心率手表什么牌子好| 姓贾的男孩取什么名字好| 头晕吃什么可以缓解| 脑供血不足吃什么药效果好| 碍事是什么意思| 物理意义是什么意思| 男人吃什么补肾| 什么病可以申请低保| 精液是什么味| 夏天是什么时候| 口蘑炒什么好吃| 神经性头疼是什么原因造成的| 6.12是什么星座| 老抽和生抽有什么区别| 十月二十二是什么星座| 孕妇梦见别人怀孕是什么意思| 什么是命题| 念珠菌性阴道炎用什么药| 梦到车被撞了什么预兆| 地级市市委书记是什么级别| 日斤读什么字| 什么水果美白| 四月是什么生肖| 汗斑用什么药| 鸡胸是什么原因引起的| 产后抑郁一般发生在产后什么时间| 512是什么星座| 爰是什么意思| 总胆固醇什么意思| spv是什么| 苏铁是什么植物| 死板是什么意思| 锦鲤跳缸是什么原因| 今天是什么节气24节气| 福星高照是什么生肖| 肚子冰凉是什么原因| 魔性是什么意思| 闹心是什么意思啊| 咽后壁淋巴滤泡增生吃什么药| 忌入宅是什么意思| 肺部钙化是什么意思啊| 情未了什么意思| 比重是什么意思| 忽冷忽热是什么意思| 忌诸事不宜什么意思| 戒指戴左手食指是什么意思| paw是什么意思| 取笑是什么意思| 1004是什么星座| 望眼欲穿是什么意思| 油边是什么肉| 桂圆有什么功效| IOM是什么意思| 头晕目眩是什么意思| 热裤是什么裤子| 现在小麦什么价格| 纹身纹什么招财好运| 什么的围巾| 元旦北京有什么好玩的| 蛇为什么有毒| 前卫是什么意思| mri是什么| 什么什么有力| 黑怕是什么意思| 车震什么意思| 看胰腺挂什么科| 生殖细胞瘤是什么病| 早上打碎碗是什么兆头| 88年出生属什么生肖| 月经不停吃什么药| 吃什么食物能升白细胞| amh是什么检查项目| 力排众议是什么意思| 为什么喝咖啡会拉肚子| 腹泻不能吃什么食物| 心肌炎有什么症状和表现| 扑感敏又叫什么名字| 睡觉开风扇有什么危害| gap是什么档次的牌子| 吃什么通便效果最好最快| 血小板计数偏高是什么原因| 6个月宝宝可以吃什么水果| 参谋是什么军衔| 1933年属什么| 身上长痣是什么原因| 人流后吃什么水果| 山茶花是什么颜色| 东北大拉皮是什么做的| 伏藏是什么意思| 儿童拉肚子挂什么科| 什么是风湿热| 七字五行属什么| 狗狗感冒了是什么症状| 小孩发烧流鼻血是什么原因| e2是什么意思| 吃什么补黄体酮| 例假提前是什么原因| 症是什么意思| 为什么说肺结核是穷人病| 裙带菜是什么菜| 可乐杀精是什么意思| 湿气重什么原因| 杨桃是什么季节的水果| 碳酸氢钠是什么添加剂| 医学上是什么意思| 湿气重吃什么药| 妇科病有什么症状| 清水文是什么意思| 版记是什么| bmi什么意思| 早上咳嗽是什么原因| 癫痫病吃什么药最好| 什么木材有香味| 居高临下的临是什么意思| 前列腺素是什么| 小孩一到晚上就发烧是什么原因| 酒后手麻什么原因| 57年属什么生肖| pml是什么意思| 牙齿酸是什么原因| 海参吃了有什么好处| 2026是什么年| 基药是什么意思| 眼睛模糊什么原因| 随访复查什么意思| 全套是什么| 肌肉酸痛是什么原因| 中国第一长河是什么河| 总动员是什么意思| ace什么意思| 梦到别人结婚是什么意思| 藏红花可以搭配什么泡水喝| 什么叫粳米| 杨枝甘露是什么| 为什么会得灰指甲| wht什么颜色| 味素是什么| 刚生完孩子的产妇吃什么好| 办健康证挂什么科| 咽干是什么原因| 左侧卵巢内囊性回声是什么意思| 白莲花什么意思| 上呼吸道感染吃什么消炎药| 荒淫无度是什么意思| 得了阴虱用什么药能除根| 什么叫种草| 三点水加四读什么| 滋阴潜阳是什么意思| 脑梗输液用什么药| 为什么不建议儿童做胃镜| 什么病不能吃茄子| 人流后吃什么恢复快| 脂肪肝轻度是什么意思| 孕妇梦见西瓜是什么意思| hib疫苗是什么意思| 苹果有什么功效和营养| 什么是区块链技术| 人棍是什么意思| 昆布是什么| 血稠是什么原因造成的| 鬼门关是什么意思| 兴旺的反义词是什么| 狮子是什么生肖| 挂钟挂在客厅什么位置好| 加油站为什么不能打电话| 嗓子发炎挂什么科| 借鸡生蛋是什么意思| 女人来月经吃什么好| 爱的最高境界是什么| 挂钩疼挂什么科| 亥和什么合| 自然人是什么意思| 为什么怀孕前三个月不能说| 液体套是什么| 天麻起什么作用| 什么茶最好喝| 一什么明月| 人格分裂什么意思| 左行气右行血什么意思| 火镰是什么意思| 什么是性高潮| 苏打和小苏打有什么区别| 捋一捋是什么意思| 丢是什么意思| 无感什么意思| 了凡四训讲的是什么| 属鸡今年要注意什么| 马的贵人是什么生肖| 高烧后拉稀说明什么| 睡觉流口水什么原因| 血管紧张素是什么意思| 大便溏薄是什么意思| 什么是ph值| 一血是什么意思| 三合是什么意思| 老是拉肚子什么原因| 1946年属狗的是什么命| 浪琴军旗什么档次| 什么是尖锐湿疣| 扑炎痛又叫什么| 心五行属性是什么| 腰底部疼痛跟什么病有关| 血压高可以吃什么水果| 18岁属什么的生肖| 皮炎用什么药| 芍药花什么时候开花| 正正得什么| pet是什么| 惊世骇俗的意思是什么| 香蕉什么时候成熟| 近五行属什么| 霜降出什么生肖| 蝉的幼虫叫什么| 生殖器疱疹擦什么药| 7.14什么星座| 汉语拼音什么时候发明的| 刮痧用的油是什么油| 肺纤维灶是什么意思| 姚字五行属什么| 烧心吃点什么药| 氰化钠是什么| 早搏是什么意思| 身心疲惫是什么意思| 母亲o型父亲b型孩子是什么血型| 人得了猫藓用什么药膏| 女人吃藕有什么好处| 军绿色裤子配什么上衣| 洗头膏什么牌子好| 苦瓜汤为什么要放黄豆| 脑供血不足做什么检查| 为什么现在不建议输液| 孕妇吃什么钙片好| 百度Jump to content

深夜开工专骗旅美华人 台湾一诈骗集团被端13人被捕-台湾-时政频道-中工网

Listen to this article
From Wikipedia, the free encyclopedia
An HSM in PCIe format
百度 截至目前,仍有9名船员失踪。

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.[1] These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.[2][3]

Design

[edit]

HSMs may have features that provide tamper evidence such as visible signs of tampering or logging and alerting, or tamper resistance which makes tampering difficult without making the HSM inoperable, or tamper responsiveness such as deleting keys upon tamper detection.[4] Each module contains one or more secure cryptoprocessor chips to prevent tampering and bus probing, or a combination of chips in a module that is protected by the tamper evident, tamper resistant, or tamper responsive packaging. A vast majority of existing HSMs are designed mainly to manage secret keys. Many HSM systems have means to securely back up the keys they handle outside of the HSM. Keys may be backed up in wrapped form and stored on a computer disk or other media, or externally using a secure portable device like a smartcard or some other security token.[5]

HSMs are used for real time authorization and authentication in critical infrastructure thus are typically engineered to support standard high availability models including clustering, automated failover, and redundant field-replaceable components.

A few of the HSMs available in the market have the capability to execute specially developed modules within the HSM's secure enclosure. Such an ability is useful, for example, in cases where special algorithms or business logic has to be executed in a secured and controlled environment. The modules can be developed in native C language, .NET, Java, or other programming languages.

Certification

[edit]

Due to the critical role they play in securing applications and infrastructure, general purpose HSMs and/or the cryptographic modules are typically certified according to internationally recognized standards such as Common Criteria (e.g. using Protection Profile EN 419 221-5, "Cryptographic Module for Trust Services") or FIPS 140 (currently the 3rd version, often referred to as FIPS 140-3). Although the highest level of FIPS 140 security certification attainable is Security Level 4, most of the HSMs have Level 3 certification. In the Common Criteria system the highest EAL (Evaluation Assurance Level) is EAL7, most of the HSMs have EAL4+ certification. When used in financial payments applications, the security of an HSM is often validated against the HSM requirements defined by the Payment Card Industry Security Standards Council.[6]

Uses

[edit]

A hardware security module can be employed in any application that uses digital keys. Typically, the keys would be of high value - meaning there would be a significant, negative impact to the owner of the key if it were compromised.

The functions of an HSM are:

  • onboard secure cryptographic key generation,
  • onboard secure cryptographic key storage, at least for the top level and most sensitive keys, which are often called master keys,
  • key management,
  • use of cryptographic and sensitive data material, for example, performing decryption or digital signature functions,
  • onboard secure deletion of cryptographic and other sensitive data material that was managed by it.

HSMs are also deployed to manage transparent data encryption keys for databases and keys for storage devices such as disk or tape.[citation needed]

Some HSM systems are also hardware cryptographic accelerators. They usually cannot beat the performance of hardware-only solutions for symmetric key operations. However, with performance ranges from 1 to 10,000 1024-bit RSA signatures per second, HSMs can provide significant CPU offload for asymmetric key operations. Since the National Institute of Standards and Technology (NIST) is recommending the use of 2,048 bit RSA keys from year 2010,[7] performance at longer key sizes has become more important. To address this issue, most HSMs now support elliptic curve cryptography (ECC), which delivers stronger encryption with shorter key lengths.

PKI environment (CA HSMs)

[edit]

In PKI environments, the HSMs may be used by certification authorities (CAs) and registration authorities (RAs) to generate, store, and handle asymmetric key pairs. In these cases, there are some fundamental features a device must have, namely:

  • Logical and physical high-level protection
  • Multi-part user authorization schema (see secret sharing)
  • Full audit and log traces
  • Secure key backup

On the other hand, device performance in a PKI environment is generally less important, in both online and offline operations, as Registration Authority procedures represent the performance bottleneck of the Infrastructure.

Card payment system HSMs (bank HSMs)

[edit]

Specialized HSMs are used in the payment card industry. HSMs support both general-purpose functions and specialized functions required to process transactions and comply with industry standards. They normally do not feature a standard API.

Typical applications are transaction authorization and payment card personalization, requiring functions such as:

  • verify that a user-entered PIN matches the reference PIN known to the card issuer
  • verify credit/debit card transactions by checking card security codes or by performing host processing components of an EMV based transaction in conjunction with an ATM controller or POS terminal
  • support a crypto-API with a smart card (such as an EMV)
  • re-encrypt a PIN block to send it to another authorization host
  • perform secure key management
  • support a protocol of POS ATM network management
  • support de facto standards of host-host key | data exchange API
  • generate and print a "PIN mailer"
  • generate data for a magnetic stripe card (PVV, CVV)
  • generate a card keyset and support the personalization process for smart cards

The major organizations that produce and maintain standards for HSMs on the banking market are the Payment Card Industry Security Standards Council, ANS X9, and ISO.

SSL connection establishment

[edit]

Performance-critical applications that have to use HTTPS (SSL/TLS), can benefit from the use of an SSL Acceleration HSM by moving the RSA operations, which typically requires several large integer multiplications, from the host CPU to the HSM device. Typical HSM devices can perform about 1 to 10,000 1024-bit RSA operations/second.[8][9] Some performance at longer key sizes is becoming increasingly important.

DNSSEC

[edit]

An increasing number of registries use HSMs to store the key material that is used to sign large zonefiles. OpenDNSSEC is an open-source tool that manages signing DNS zone files.

On January 27, 2007, ICANN and Verisign, with support from the U.S. Department of Commerce, started deploying DNSSEC for DNS root zones.[10] Root signature details can be found on the Root DNSSEC's website.[11]

A cryptocurrency hardware wallet

Blockchain and HSMs

[edit]

Blockchain technology depends on cryptographic operations. Safeguarding private keys is essential to maintain the security of blockchain processes that utilize asymmetric cryptography. The private keys are often stored in a cryptocurrency wallet like the hardware wallet in the image.

The synergy between HSMs and blockchain is mentioned in several papers, emphasizing their role in securing private keys and verifying identity, e.g. in contexts such as blockchain-driven mobility solutions.[12][13]

See also

[edit]

Notes and references

[edit]
  1. ^ Sommerhalder, Maria (2023), Mulder, Valentin; Mermoud, Alain; Lenders, Vincent; Tellenbach, Bernhard (eds.), "Hardware Security Module", Trends in Data Protection and Encryption Technologies, Cham: Springer Nature Switzerland, pp. 83–87, doi:10.1007/978-3-031-33386-6_16, ISBN 978-3-031-33386-6
  2. ^ Ramakrishnan, Vignesh; Venugopal, Prasanth; Mukherjee, Tuhin (2015). Proceedings of the International Conference on Information Engineering, Management and Security 2015: ICIEMS 2015. Association of Scientists, Developers and Faculties (ASDF). p. 9. ISBN 9788192974279.
  3. ^ Gregg, Michael (2014). CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002. John Wiley & Sons. p. 246. ISBN 9781118930847.
  4. ^ "Electronic Tamper Detection Smart Meter Reference Design". freescale. Retrieved 26 May 2015.
  5. ^ "YubiHSM 2: Backup and Restore — YubiHSM 2 User Guide documentation". docs.yubico.com. Retrieved 2025-08-08.
  6. ^ "Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards". www.pcisecuritystandards.org. Retrieved 2025-08-08.
  7. ^ "Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths". NIST. January 2011. Retrieved March 29, 2011.
  8. ^ F. Demaertelaere. "Hardware Security Modules" (PDF). Atos Worldline. Archived from the original (PDF) on 6 September 2015. Retrieved 26 May 2015.
  9. ^ "Preparing to Issue 200 Million Certificates in 24 Hours - Let's Encrypt". Let's Encrypt. 10 February 2021. Retrieved 2025-08-08.
  10. ^ "ICANN Begins Public DNSSEC Test Plan for the Root Zone". www.circleid.com. Retrieved 2025-08-08.
  11. ^ Root DNSSEC
  12. ^ Shbair, Wazen M.; Gavrilov, Eugene; State, Radu (May 2021). "HSM-based Key Management Solution for Ethereum Blockchain". 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). pp. 1–3. doi:10.1109/ICBC51069.2021.9461136. ISBN 978-1-6654-3578-9. S2CID 235637476. Archived from the original on 2025-08-08. Retrieved 2025-08-08.
  13. ^ Pirker, Dominic; Fischer, Thomas; Witschnig, Harald; Steger, Christian (January 2021). "Velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 Tokens". 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP). pp. 62–67. doi:10.1109/CSP51677.2021.9357605. ISBN 978-1-7281-8621-4. S2CID 232072116.
[edit]
Listen to this article (10 minutes)
Spoken Wikipedia icon
This audio file was created from a revision of this article dated 12 October 2023 (2025-08-08), and does not reflect subsequent edits.
清肺热用什么泡水喝比较好 口臭是什么原因造成的 什么是因果 以什么见什么 乱的偏旁是什么
鼻炎和鼻窦炎有什么区别 2019属什么生肖 补肾壮阳吃什么好 记忆力下降是什么原因引起的 秋葵对痛风有什么好处
贝母和川贝有什么区别 检查肾脏挂什么科 gl小说是什么意思 张牙舞爪是什么生肖 r一谷氨酰转移酶高说明什么
脑血栓有什么症状 禾花鱼是什么鱼 血小板低有什么危险 食管反流吃什么药 缘木求鱼什么意思
老是感冒是什么原因hcv9jop3ns4r.cn 死间计划到底是什么liaochangning.com 看肺应该挂什么科hcv9jop8ns0r.cn 舌边有齿痕是什么原因hcv9jop3ns1r.cn 梦见捡板栗是什么意思hanqikai.com
饮食清淡主要吃什么hcv8jop7ns5r.cn 阴茎痒是什么原因hcv9jop0ns1r.cn 肝右叶占位是什么意思hcv8jop1ns5r.cn 没谁了是什么意思hcv9jop3ns7r.cn 牛百叶是什么hcv9jop0ns4r.cn
天天做梦是什么原因fenrenren.com ds什么意思hcv8jop5ns5r.cn 红肉是指什么肉hcv8jop2ns5r.cn 边缘视力是什么意思hcv8jop9ns7r.cn 男人眉骨高代表什么xianpinbao.com
神经系统由什么组成hcv9jop2ns4r.cn 吃什么营养神经hcv8jop1ns0r.cn 反酸是什么意思hcv8jop2ns0r.cn 陈皮有什么功效作用hcv8jop4ns1r.cn 中暑什么症状hcv8jop3ns7r.cn
百度