Validating a high performance programmable secure coprocessor
The the IBM® 4767-002 PCIe Cryptographic Coprocessor Hardware Security Module (HSM) that forms the heart of our line of Trenton Cryptographic Systems (TCS) is driven by a PCIe interface.
Often multiple levels of security need to be addressed to reduce the risk of tampering.
Some considerations might include: Tamper means interfere with (something) without authority or so as to cause damage.
Tamper-resistant microprocessors are used to store and process private or sensitive information, such as private keys or electronic money credit.
To prevent an attacker from retrieving or modifying the information, the chips are designed so that the information is not accessible through external means and can be accessed only by the embedded software, which should contain the appropriate security measures.
A user who breaks equipment by modifying it in a way not intended by the manufacturer might deny they did it, in order to claim the warranty or (mainly in the case of PCs) call the helpdesk for help in fixing it.
Tamper-evident seals may be enough to deal with this.
However, they cannot easily be checked remotely, and many countries have statutory warranty terms that mean manufacturers may still have to service the equipment.
Tamper proof screws will stop most casual users from tampering in the first place.
This robust hardware security module affords high-security processing and high-speed cryptographic operations at maximum flexibility and maximum trust for a computing system while operating in physically insecure environments.