About 186,000 results
Open links in new tab
  1. encryption - What are the differences between TPM and HSM ...

    May 8, 2015 · TPM (Trusted Platform Module) and HSM (Hardware Security Module) are considered as cryptoprocessor, but what are the differences exactly? Does one of them has …

  2. 信息安全中的HSM 和 SHE 两个概念有什么区别和相同的地方?

    攻击者可以通过窃听CPU和HSM之间的线路,来获取有关秘密业务的信息,或要求HSM签名不是由CPU生成的数据,从而导致安全性降低。 因此,该体系架构适用于设计生产周期短、安全 …

  3. Why is an HSM required to protect CA certificates (rather than a ...

    Jul 11, 2018 · The Use of HSM's for Certificate Authorities HSM's are common for CA applications, typically when a company is running there own internal CA and they need to …

  4. Open-Source Hardware Security Modules (HSM)

    Mar 24, 2021 · Developing an HSM is a lot of work, especially if you are complying with FIPS level 3 / 4 physical tampering and side-channel resistance. I could imagine a world where a group of …

  5. hsm - What does “PIN encrypted under LMK” mean? - Information …

    Mar 23, 2015 · What does PIN encrypted under LMK mean? From what I understand the Local Master Key is only there to encrypt other keys. I was reading some code and I saw function …

  6. What are the differences between HSM and SE?

    Apr 26, 2019 · The insides of a smart card, small HSM (USB dongle size), TPM, SE, etc. are all the same. There is a question of how much storage it has, which primitives/algorithms are …

  7. the integration of NGINX and HSM in TLS offloading

    May 24, 2025 · Does the HSM participate in encryption/decryption of the TLS session data? AWS CloudHSM article did not elaborate if HSM gets involve after the handshake process ends …

  8. aes - Designing my own HSM using an Arduino - Information …

    Apr 18, 2016 · Ah. HSM is the proper term, thanks. I am familiar with FDE. I want to be move the encrypted data to different devices without ever decrypting them.

  9. Criteria for Selecting an HSM - Information Security Stack Exchange

    A very sensitive application has to protect several different forms of data, such as passwords, credit cards, and secret documents - and encryption keys, of course. As an alternative to …

  10. hsm - Nginx Fails to Load PKCS#11 Key—But Works with strace.

    Feb 17, 2025 · Most likely, service nginx start is actually running it through systemd, and systemd is applying extra restrictions, such as running it with PrivateTmp=true or ProtectHome=, which …