From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Hardware security

Hardware security

Hi, I'm Matthew Clark. And this is Lesson 4.11: Hardware Security Modules. In this lesson, we will introduce the hardware security modules and compare them with TPMs and TEEs. We'll identify common uses and we'll discuss secure boot and how it compares with measured boot. So let's get started. The underlying technology that enables an HSM was invented by Mohamed Atalla, an Egyptian engineer. He called his invention the Atalla box, and it could encrypt PIN and ATM messages and protect all flying devices with an unguessable PIN generating key. At the heart of his invention, lay the key block, which would allow for the secure interchange of symmetric keys or PINs between employees in the banking industry. The Atalla key block or AKB format, which enables this exchange, is the root of all cryptography used in the Payment Card Industry Data Security Standard, or PCI DSS, and the American National Standards Institute, or ANSI. So what is an HSM? Well, when it comes to IoT, many times we'll…

Contents