Hardware security

Source: Wikipedia, the free encyclopedia.

Hardware security is a discipline originated from the cryptographic engineering and involves

hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.[1][2][3][4]

A

digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server
.

Some providers in this discipline consider that the key difference between hardware security and software security is that hardware security is implemented using "non-Turing-machine" logic (raw combinatorial logic or simple state machines). One approach, referred to as "hardsec", uses FPGAs to implement non-Turing-machine security controls as a way of combining the security of hardware with the flexibility of software.[5]

electronic system, particularly in the context of integrated circuit.[1][3]

A

integrated circuits
and are typically used in applications with high security requirements.

Many attacks on sensitive data and resources reported by organizations occur from within the organization itself.[8]

See also

References

  1. ^ . Retrieved 3 June 2017.
  2. ^ "Hardware security in the IoT - Embedded Computing Design". embedded-computing.com. Retrieved 3 June 2017.
  3. ^
    S2CID 16430074
    .
  4. .
  5. . Retrieved 2019-08-27.
  6. . Retrieved 3 June 2017.
  7. ^ "Hardware Security - Fraunhofer AISEC". Fraunhofer-Institut für Angewandte und Integrierte Sicherheit (in German). Retrieved 3 June 2017.
  8. ^ "Hardware Security". web.mit.edu. Archived from the original on 22 May 2017. Retrieved 3 June 2017.

External links