\u652f\u6301APB\/AXI4\u7b49\u4ecb\u9762\u4e26\u5167\u7f6e\u8a18\u61b6\u9ad4\u76f4\u63a5\u5b58\u53d6(DMA) <\/li><\/ol>\n\n\n\n\u9664\u4e86\u5b89\u5168\u6f14\u7b97\u6cd5\u901a\u904eCAVP\u8a8d\u8b49\u4e4b\u5916\uff0c\u76ee\u524d\u9032\u884c\u4e2d\u7684\u8a8d\u8b49\u8a08\u5283\u9084\u5305\u542b\u57fa\u65bc\u7269\u806f\u7db2\u88dd\u7f6e\u5b89\u5168\u70ba\u4e3b\u7684\u65b0\u4e00\u4ee3\u5b89\u5168\u6a19\u6e96PSA (platform security architecture)\u6240\u63d0\u4f9bPSA Lv2 \u7684\u9a57\u8b49\u8a08\u5283\u4ee5\u53ca\u6297\u653b\u64ca\u8a2d\u8a08\u7684\u8a8d\u8b49\u3002 <\/p>\n\n\n\n
PSA\u8a8d\u8b49\u4e3b\u8981\u63d0\u4f9b\u4e00\u500b\u5b89\u5168\u6846\u67b6\u548c\u591a\u7d1a\u8a55\u4f30\u65b9\u6848\uff0c\u8a72\u8a8d\u8b49\u6db5\u84cb\u7531\u9023\u63a5\u8a2d\u5099\u7684\u5b89\u5168\u8edf\u9ad4\u9a45\u52d5\uff0c\u4e26\u4ee5\u4fe1\u4efb\u6839\u70ba\u786c\u9ad4\u4fe1\u4efb\u529f\u80fd\u3002 <\/p>\n\n\n\n
\u6297\u653b\u64ca\u8a2d\u8a08\u8a8d\u8b49\u5247\u59d4\u8a17Riscure\u9032\u884c\u7522\u54c1\u6f0f\u6d1e\u5206\u6790\u6aa2\u6e2c\uff08Vulnerability Analysis\uff09\uff0c\u4ee5\u78ba\u4fdd\u7522\u54c1\u6297\u653b\u64ca\u8a2d\u8a08\u80fd\u62b5\u6297\u60e1\u610f\u653b\u64ca\uff0c\u5e6b\u52a9\u5ba2\u6236\u4fdd\u8b77\u6a5f\u5bc6\u8cc7\u8a0a\u3002 <\/p>\n\n\n\n
\u7d50\u5408CAVP\u8a8d\u8b49\u904e\u7684\u5b89\u5168\u6f14\u7b97\u6cd5\u3001PSA\u6676\u7247\u5b89\u5168\u67b6\u69cb\u3001\u6297\u7269\u7406\u653b\u64ca\u8a2d\u8a08 (anti-tampering)\uff0c\u71b5\u78bc\u79d1\u6280\u7684\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u5c07\u5728\u4e0d\u540c\u61c9\u7528\u5834\u666f\u5e6b\u52a9\u5ba2\u6236\u7522\u54c1\u63d0\u4f9b\u9ad8\u5b89\u5168\u6027\u7684\u904b\u4f5c\u8207\u9632\u8b77\u6a5f\u5236\u3002 <\/p>\n","protected":false},"excerpt":{"rendered":"
The certified\u00a0security algorithms include\u00a0AES, CMAC, DRBG, key wrap, SHA2, HMAC, KDF, and ECDSA.\u00a0\u00a0<\/p>\n","protected":false},"author":3,"featured_media":1874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[217],"class_list":["post-1985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-crypto-coprocessor"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1985"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=1985"}],"version-history":[{"count":4,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1985\/revisions"}],"predecessor-version":[{"id":4697,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1985\/revisions\/4697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/1874"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=1985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/categories?post=1985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/tags?post=1985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}