This white paper discusses the weaknesses that are inherent to software-based cryptographic modules in relation to cryptographic modules that are hardware based. Other advantages and disadvantages of hardware vs. software approaches are beyond the scope of this white paper. Each one of the following sections focuses on one security aspect in which hardware and software implementations of cryptographic modules differ.

For more information on cryptographic modules, visit Discretix Technologies’ Web site.