University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > OpenHSM: An Open key life cycle protocol for Public Key Infrastructure's Hardware Security Modules

OpenHSM: An Open key life cycle protocol for Public Key Infrastructure's Hardware Security Modules

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Saar Drimer.

The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI . Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for any PKI deployment. The software that manages keys inside an HSM should control all life cycle of a private key. Normally this kind of equipment implements a embedded key management protocol and this protocols are not available to public scrutiny due to industrial interests. Other important issue is that HSMs are targeted in their development to the Bank industry and not to PKI , making some important PKI issues, like, strict key usage control and a secure auditing trail, play a secondary role. This paper presents an open protocol to securely manage private keys inside HSMs. The protocol is described, analysed and discussed.

Link to the paper: http://www.cl.cam.ac.uk/users/jem74/europki-2007.pdf

Paper continuing the idea: http://www.cl.cam.ac.uk/users/jem74/sbseg2007.pdf

This talk is part of the Computer Laboratory Security Group meeting presentations series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity