Skip to main content

Questions tagged [cryptographic-hardware]

Cryptographic hardware enables the handling of cryptographic tasks and/or problems using hardware instead of software solutions.

Filter by
Sorted by
Tagged with
5 votes
1 answer
295 views

This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
b degnan's user avatar
  • 5,385
3 votes
2 answers
337 views

I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
Seau's user avatar
  • 31
1 vote
1 answer
85 views

I would like to implement an HSM-backed KMS server for Kubernetes secrets and Talos Linux disk encryption keys for use in my homelab. I have a SmartCard-HSM EA+ for this purpose. Because of the ...
Scott Colby's user avatar
1 vote
1 answer
89 views

I've been reading up on hardware reverse engineering, specifically in the context of FPGAs and how one might retrieve critical information like the contents of Lookup Tables (LUTs). After ...
ijjo99's user avatar
  • 11
2 votes
0 answers
97 views

Even though this sounds hardware related, it's essential to understand the actual security one obtains from memory hard key derivation functions, such as Balloon, as its strongest security guarantee ...
caveman's user avatar
  • 721
2 votes
0 answers
48 views

I need to buy an HSM for a project (need it for compliance with government regulations) and I am kind of confused. Price range is really wide. I can see used THALES nCipher HSMs on eBay for as low as ...
Pablo Santa Cruz's user avatar
1 vote
0 answers
222 views

SHA-256 has been allocated silicon on modern CPU's (SHA-NI). 256-bit hash space is considered secure even against CRQC (Cryptographically Relevant Quantum Computers). Accelerated SHA-256 outperforms ...
Shani's user avatar
  • 11
1 vote
0 answers
195 views

Lets assume the following scenario: We have an Ed25519 secret key generated on a hardware device (like a Yubikey). Lets assume it is protected by the device and cannot be exported. The device can - in ...
raisyn's user avatar
  • 491
0 votes
0 answers
29 views

I'm performing theory and technical research on reversing the logic output of an old, decaying and fragile arcade board IC that utilizes LFSRs in order to generate multiple randomized star-field ...
MonoBunny's user avatar
1 vote
1 answer
157 views

Rust doesn't have a random number generator in the standard library, so I've been experimenting with creating my own random() function. One simple option would just ...
Arbel Groshaus's user avatar
1 vote
1 answer
117 views

I am a beginner and I am learning about XOR counts, (Link to background: https://ia.cr/2014/530). The 4 by 4 matrix used in the MixColumn operation in AES is [2,3,1,1],[1,2,3,1],[1,1,2,3],[3,1,1,2]. I ...
Kurious Koder's user avatar
0 votes
0 answers
40 views

In our hardware security exercise, I am trying to calculate the ANF function manually (Sboxes) for the given table: And I came up with the result as: I thought I was calculating it correctly using ...
TorJaks669's user avatar
1 vote
0 answers
85 views

I saw the difference between the proof and the statement of "proposition 2" in the paper "MDx-MAC and building fast MACs from hash functions" by Bart Preneel & Paul C. van ...
hellobc's user avatar
  • 27
0 votes
0 answers
74 views

I am working on a project where I need to authenticate data in parallel with computations on that data. The idea is to stream data from memory onto the chip only once; while the data is on-chip, we do ...
Nate's user avatar
  • 1
3 votes
1 answer
282 views

i have a pretty straightforward question but i can’t seem to find an answer : Regardless of the physical protection provided by an HSM or TPM or any hardware cryptographic key storage system, are keys ...
khaled's user avatar
  • 51

15 30 50 per page
1
2 3 4 5
11