{"id":564,"date":"2019-09-11T18:51:07","date_gmt":"2019-09-11T18:51:07","guid":{"rendered":"https:\/\/blog.pufsecurity.com\/?p=199"},"modified":"2022-04-06T05:39:12","modified_gmt":"2022-04-06T05:39:12","slug":"the-good-the-bad-and-the-ugly-of-hardware-security","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hant\/document\/the-good-the-bad-and-the-ugly-of-hardware-security\/","title":{"rendered":"The good, the bad and the ugly of hardware security"},"content":{"rendered":"\n
Abstract<\/strong><\/h2>\n\n\n\n
Data encryption can be implemented either by hardware or by software. It is generally accepted that software encryption is flexible, more cost-effective as well as easier to develop and to maintain, but it is significantly less secure and slower than its hardware equivalent. Since either hardware-based security or software-based security has its own pros and cons, a company needs to consider many factors like budget, performance, security, governing regulations, etc, to decide on choosing either hardware or software based security implementations. No matter which solution a company chose, they should be consciously aware of the \u201cgood\u201d, \u201cbad\u201d and \u201cugly\u201d of the solution they pick! Thus, to choose or not to choose hardware-based security is a big decision for every company to make regarding protecting their highly important sensitive information from unauthorized access. The focus of this article is on the \u201cgood\u201d, \u201cbad\u201d and the \u201cugly\u201d of hardware-based security. <\/p>\n\n\n\n
Introduction<\/strong><\/h2>\n\n\n\n
Data encryption has been used extensively by the governments, financial institutions, and other business to protect their highly important sensitive information from unauthorized access. There are basically two types of encryption methods that are available, namely, hardware-based and software-based encryption.<\/p>\n\n\n\n
Generally speaking, hardware based encryption is considered to be safer\/more secure, faster, and better assured than its software equivalent by many computer experts. However, it is also more costly, less flexible, and not easy to update or upgrade compared to its software equivalent.<\/p>\n\n\n\n
This article will discuss the \u201cgood\u201d, \u201cbad\u201d and the \u201cugly\u201d of hardware-based security.<\/p>\n\n\n\n
<\/p>\n\n\n\n
Preface<\/strong><\/h3>\n\n\n\n
About 30+ years ago during a\nTrusted Computing conference, a 3-stars U.S. General, who was the U.S. security\nchief at time, used to make the following interesting remarks half-jokingly: <\/p>\n\n\n\n
“I love computer hardware because I can touch it; feel about it; see it is working with my naked eyes; and best of all, I can even kick it to reboot when it breaks down!”<\/p>
“On the other hand, I’m never fond of computer software because it is invisible to me; untouchable by me; hard for me to tell whether it’s really functioning; and worst-of-all I’m totally in the dark when it becomes compromised or misbehaved!\u201d<\/p><\/blockquote>\n\n\n\n
The above remarks underlined the stereotype impressions of computer hardware vs. software and also reflected the U.S. security establishments\u2019 preference of hardware-based security over software-based security. <\/p>\n\n\n\n
<\/p>\n\n\n\n
What is software security?<\/strong><\/h3>\n\n\n\n
Software-base security (or software security for short) is readily available for all major operating systems and more prevalent than hardware solutions nowadays. These software solutions can be used to protect all devices within an organization, and they are cost effective as well as easy to use, upgrade and update. They have been deployed to address basic security needs like firewalls, secure boots, PKI-based authentications, etc, to protect the devices or systems from attacks originating from both inside and outside the systems. For example, software encryption is employed to protect data at rest, in transit, and stored on different devices. However, the protection provided by software encryption solutions is only as strong as the level of security of the operating system of the host device, since any security flaw in the OS can easily compromise the security provided by the software encryption code. Furthermore, encryption software may be complicated to configure for advanced use and could possibly be turned off or by-passed by malicious users. Performance degradation is also a significant problem with software-based security.<\/p>\n\n\n\n
<\/p>\n\n\n\n
What is hardware security?<\/strong><\/h3>\n\n\n\n
Hardware-base security (or hardware security for short) is a discipline originated out of cryptographic engineering. It is a physical device using a dedicated security IC, or a processor with specialized security hardware specifically designed to provide cryptographic functions and also protect itself and the associated critical data against attacks. Hardware security typically contains security primitive functions such as a math accelerator, Pseudo or True random number generator (PRNG\/TRNG), nonvolatile memory, tamper detection, one-time programmable (OTP) and even a physically unclonable function (PUF). <\/p>\n\n\n\n