14.07.2013 Views

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

policies on transactions (e.g. the same goods cannot be sold twice). A natural way<br />

to implement such a policy is with an HSM.<br />

Key-Loading Sites – Applications which deploy thousands of HSMs into a public environment,<br />

such as pay-TV smartcards and prepayment electricity meters all require<br />

an infrastructure to initialise them before delivery. Generic manufacturing processes<br />

are often followed by a key-loading phase, which may happen at an entirely different<br />

facility from that where the manufacture took place. These key-loading facilities<br />

can hold master keys which are used to derive the keys for a particular device, or<br />

valuable signing keys used to certify the authenticity of a device. The same API<br />

technology which protects the devices during deployment is thus used to secure the<br />

loading process from potentially untrustworthy staff.<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!