Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Trusted Hardware

  • Radu SionEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_1491


Secure hardware; Tamper-proof hardware


Trusted Hardware is a broad term used to denote any hardware that has been certified to perform according to a certain set of requirements. Most often however, “trusted hardware” is discussed in adversarial contexts. The term has thus been somewhat hijacked to mean “tamper-proof” hardware, i.e., hardware designed to resist direct physical access adversaries. Often trusted hardware encompasses some cryptographic abilities, i.e., performing encryption and data authentication.

Key Points

Certification. The National Institute of Standards has established a set of standards for security requirements of cryptographic modules and specifically for physical properties and tamper-resistance thereof [2]. The FIPS 140-2 Level 4 certification is at present the highest-attainable hardware security in sensitive, non-classified domains. While a plethora of devices have undergone FIPS certification, the most common types of trusted hardware in...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    IBM Cryptographic Hardware. 2014. Online at http://www-03.ibm.com/security/cryptocards/
  2. 2.
    NIST Federal Information Processing Standards. 2014. Online at http://csrc.nist.gov/publications/fips/
  3. 3.
    Trusted Computing Group. 2014. Online at http://www.trustedcomputinggroup.org/

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Stony Brook UniversityStony BrookUSA

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly