Title :
Improving security in information technology using cryptographic hardware modules
Author :
Sanchez-Reillo, R. ; Sanchez-Avila, C. ; Lopez-Ongil, C. ; Entrena-Arrontes, L.
Author_Institution :
Dpt. Tecnologia Electronica, Univ. Carlos III de Madrid, Leganes, Spain
Abstract :
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc. But many other security holes have appeared in this kind of applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications\´ specification.
Keywords :
cryptography; information technology; message authentication; authentication techniques; cryptographic algorithms; cryptographic hardware modules; cryptography; information technology security; security hardware modules; specification; Authentication; Computer hacking; Credit cards; Data security; Hardware; Information security; Information technology; Internet; Privacy; Public key cryptography;
Conference_Titel :
Security Technology, 2002. Proceedings. 36th Annual 2002 International Carnahan Conference on
Print_ISBN :
0-7803-7436-3
DOI :
10.1109/CCST.2002.1049236