Security Implications of Hardware vs. Software Cryptographic Modules
This white paper discusses the weaknesses that are inherent to software-based cryptographic modules in relation to cryptographic modules that are hardware based. Other advantages and disadvantages of hardware vs. software approaches are beyond the scope of this white paper. Each one of the following sections focuses on one security aspect in which hardware and software implementations of cryptographic modules differ.
Please disable any pop-up blockers for proper viewing of this Whitepaper.