Pages

This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.

Friday 17 April 2020

ANALYSIS OF HARDWARE SECURITY MODULE UTILIZATION FOR CERTIFICATION AUTHORITY SERVICES

  ANALYSIS OF HARDWARE SECURITY MODULE UTILIZATION FOR CERTIFICATION AUTHORITY SERVICES 

zaenal suhardono

The reliability of the development and application of information technology must be guaranteed so therefore it is always ready to use in accordance with the level of service required, as well as the level of data security has to be in accordance with laws and regulations. Security is an absolute aspect in the implementation of digital certification to build trust within users. However, the higher level of security applied to a system will reduce the system's performance. Therefore, the writer conducted a research on the security analysis of utilizing HSM and tested the performance of digital certificate issuance with and without HSM. Security analysis shows that the utilization of HSM can increase a higher level of security since it provides physical and logical security when generating, storing and using the private keys. In addition, with its anti-tamper feature, private keys are protected so they will not presented outside the HSM in a plain state. Therefore, keys are safe from unauthorized parties. The performance test shows that generation of keys using HSM takes 306,6 ms, which is 163,8 ms slower without HSM.


0 comments:

Post a Comment