This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Applying Protocol Analysis to Security Device Interfaces
July/August 2006 (vol. 4 no. 4)
pp. 84-87
Despite best efforts, general-purpose computing platforms and servers continue to be insecure. Due to their complexity, furthermore, it seems unlikely that a completely secure system can be built in the foreseeable future. Fortunately, a promising alternative exists: the use of trusted cryptographic devices and subsystems. Like smart cards, such devices hold and use secret cryptographic keys on behalf of a larger general-purpose system. Yet these devices are more than simply cryptographic coprocessors--they are responsible for the secrecy of their keys and will withhold them from even the system itself. If the device is also tamper-resistant (which is common), its keys will (hopefully) be used only in ways the device permits.
Index Terms:
security device interface, security, general-purpose computing platforms, cryptography, cryptographic key
Citation:
Jonathan Herzog, "Applying Protocol Analysis to Security Device Interfaces," IEEE Security & Privacy, vol. 4, no. 4, pp. 84-87, July-Aug. 2006, doi:10.1109/MSP.2006.85
Usage of this product signifies your acceptance of the Terms of Use.