- Radu SionAffiliated withStony Brook University
Trusted Hardware is a broad term used to denote any hardware that has been certified to perform according to a certain set of requirements. Most often however, “trusted hardware” is discussed in adversarial contexts. The term has thus been somewhat hijacked to mean “tamper-proof” hardware, i.e., hardware designed to resist direct physical access adversaries. Often trusted hardware encompasses some cryptographic abilities, i.e., performing encryption and data authentication.
Certification. The National Institute of Standards has established a set of standards for security requirements of cryptographic modules and specifically for physical properties and tamper-resistance thereof . The FIPS 140–2 Level 4 certification is at present the highest-attainable hardware security in sensitive, non-classified domains. While a plethora of devices have undergone FIPS certification, the most common types ...
Reference Work Entry Metrics
- Trusted Hardware
- Reference Work Title
- Encyclopedia of Database Systems
- pp 3191-3192
- Print ISBN
- Online ISBN
- Springer US
- Copyright Holder
- Springer Science+Business Media, LLC
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 1. College of Computing, Georgia Institute of Technology
- 2. Database Research Group David R. Cheriton School of Computer Science, University of Waterloo
- Radu Sion (1)
- Author Affiliations
- 1. Stony Brook University, Stony Brook, NY, USA
To view the rest of this content please follow the download PDF link above.