Hardware security
Hardware security is a discipline originated from the cryptographic engineering and involves
hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.[1][2][3][4]
A
digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server
.
Some providers in this discipline consider that the key difference between hardware security and software security is that hardware security is implemented using "non-Turing-machine" logic (raw combinatorial logic or simple state machines). One approach, referred to as "hardsec", uses FPGAs to implement non-Turing-machine security controls as a way of combining the security of hardware with the flexibility of software.[5]
A
integrated circuits
and are typically used in applications with high security requirements.
Many attacks on sensitive data and resources reported by organizations occur from within the organization itself.[8]
See also
- U.S. NRC, 10 CFR 73.54 Cybersecurity - Protection of digital computer and communication systems and networks
- NEI 08-09: Cybersecurity Plan for Nuclear Power Plants
- Computer security compromised by hardware failure
- Computer compatibility
- Proprietary software
- Free and open-source software
- Comparison of open-source operating systems
- Unified Extensible Firmware Interface § Secure Boot criticism
- Trusted Computing
- Computational trust
- Fingerprint (computing)
- Side-channel attack
- Supply chain security
- List of computer hardware manufacturers
- Consumer protection
- Security switch
- Vulnerability (computing)
- Defense strategy (computing)
- Turing completeness
- Universal Turing machine
- Finite-state machine
- Automata theory
References
- ^ ISBN 9781439895849. Retrieved 3 June 2017.
- ^ "Hardware security in the IoT - Embedded Computing Design". embedded-computing.com. Retrieved 3 June 2017.
- ^ S2CID 16430074.
- ISSN 0018-9219.
- ISSN 0307-1235. Retrieved 2019-08-27.
- ISBN 9783642144523. Retrieved 3 June 2017.
- ^ "Hardware Security - Fraunhofer AISEC". Fraunhofer-Institut für Angewandte und Integrierte Sicherheit (in German). Retrieved 3 June 2017.
- ^ "Hardware Security". web.mit.edu. Archived from the original on 22 May 2017. Retrieved 3 June 2017.
External links
- Hardsec: practical non-Turing-machine security for threat elimination "Hardsec" concept outline Archived 2020-11-11 at the Wayback Machine