datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register | Benefits

Security Implications of Hardware vs. Software Cryptographic Modules

Authored on: Jul 21, 2003 by Hagai Bar-El

Technical Paper

0 0
More InfoLess Info
This white paper discusses the weaknesses that are inherent to software-based cryptographic modules in relation to cryptographic modules that are hardware based. Other advantages and disadvantages of hardware vs. software approaches are beyond the scope of this white paper. Each one of the following sections focuses on one security aspect in which hardware and software implementations of cryptographic modules differ.

For more information on cryptographic modules, visit Discretix Technologies' Web site.

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page