RSA Security 4.3 manual Creating the Hardware Chooser, Creating the Session Chooser

Page 12

The Session Chooser

Creating the Hardware Chooser

A hardware chooser is a list of manufacturer-supplied HW_TABLE_ENTRYs. Each entry defines the necessary code for accessing the specified piece of hardware. In the case of the Intel hardware random generator, use HW_INTEL_RANDOM.

If you wish, the hardware chooser can contain several HW_TABLE_ENTRYs, possibly supplied by different manufacturers, that all correspond to the same AM in the software chooser. If more than one hardware method can be matched to a single software method, then the hardware method listed first in the hardware chooser is associated with that software method. This association is normally created at link time. This offers applications the option to ensure a certain level of security by requiring specific hardware. However, the list can be modified at run time by creating the hardware chooser at run time, and specifying the order of the HW_TABLE_ENTRYs at that time.

If the hardware corresponding to the first method is not available, then Crypto-C continues down the list in order until a method corresponding to available hardware is found. If there is no hardware available for this method, then it defaults to the software method, if available, or returns an error if not.

HW_TABLE_ENTRY *HARDWARE_CHOOSER[] = { &HW_INTEL_RANDOM, (HW_TABLE_ENTRY *)NULL_PTR

};

Creating the Session Chooser

Once you have declared the software and hardware choosers, you can call B_CreateSessionChooser to associate a hardware method (for example, HW_INTEL_RANDOM) with a software method (AM_HW_RANDOM) so that when a software method is called, it turns to the hardware. In this example, HW_INTEL_RANDOM will be called when AM_HW_RANDOM is referenced.

if ((status = B_CreateSessionChooser

(SOFTWARE_CHOOSER, &CHOOSER, (POINTER *)HARDWARE_CHOOSER, (ITEM *)NULL_PTR, NULL_PTR, &oemTagList)) != 0)

break;

The session chooser you have created should be passed in as the chooser when you

8

R S A B S A F E C r y p t o - C I n t e l H a r d w a r e U s e r ’s G u i d e

Image 12
Contents Crypto-C Cryptographic Components for CCopyright Notice Contents Crypto-C Error Codes Intel Security Hardware Error Codes IndexIntel Hardware Security Features RSA Bsafe Crypto-C InterfaceHow This Book Is Organized Additional DocumentationOverview of a Crypto-C Hardware Application Six-Step Sequence Algorithm Methods Crypto-C Algorithm MethodsIntel Hardware Algorithm Methods Algorithm MethodsSession Chooser Creating the Session ChooserCreating the Software Chooser Creating the Hardware Chooser Creating the Session ChooserHardware Availability Hardware AvailabilityHardware Errors Arsaextendederror DefinitionsHardware Errors Using the Intel Random Number Generator Random NumbersUsing the Intel RNG Intel Random Number GeneratorWhitening Hardware Results Unavailability of HardwarePseudo-Random Number Generators PRNGs Generating Random Numbers Obtaining a Random Seed from HardwareCreate the Session Chooser Create an Algorithm Object Set the Algorithm ObjectInitialize the Random Object Update the Random Object Generate Random BytesDestroy All Objects Retrieving Hardware Error Codes Generating Random Numbers in SoftwareCreate an Algorithm Object Initialize the Random Algorithm Seed the Random ObjectGenerate Random Numbers Call would be identical in a software implementationCrypto-C Error Codes Page Intel Security Hardware Error Codes Page Redistributing the Intel Security Driver Redistributing via a Silent Install Redistributing the DriverFiles Installed File Location DescriptionUser Instructions for Installing the Intel Security Driver Redistributing the Driver via .inf FilesMicrosoft Windows \REDISTRIB \INF \WDM ISDWDM.INF ISECDRV.SYS ISDCAT.CAT Index

4.3 specifications

RSA Security 4.3 is a robust cybersecurity solution designed to help organizations protect their sensitive data and secure digital identities. This version builds upon the foundation of its predecessors, offering enhanced features and technologies that address the evolving landscape of security threats.

One of the main features of RSA Security 4.3 is its advanced multi-factor authentication (MFA) capabilities. MFA is essential for blocking unauthorized access, and this version supports a wide range of authentication methods, including biometrics, hardware tokens, and software-based solutions. This flexibility allows organizations to implement strong security measures tailored to their specific needs while providing a seamless user experience.

Another significant characteristic of RSA Security 4.3 is its risk-based authentication. This feature evaluates the context of each login attempt, considering factors such as device reputation, geographical location, and user behavior. By analyzing these parameters, the system can dynamically adjust authentication requirements in real-time, adding an extra layer of security for high-risk logins while ensuring low-friction access for trusted users.

The solution also emphasizes centralized management, which enables IT teams to monitor and manage security policies and user access across the organization efficiently. With a user-friendly dashboard, administrators can easily identify potential security vulnerabilities and respond promptly to any threats. This centralized approach enhances the overall security posture of the organization.

RSA Security 4.3 integrates advanced analytics and machine learning, allowing organizations to detect anomalies and trends in user behavior. These capabilities help identify potential threats before they escalate, offering valuable insights into security events. This proactive approach to threat detection is crucial in a landscape where cyber attacks are becoming increasingly sophisticated.

In conclusion, RSA Security 4.3 stands out with its multi-factor authentication, risk-based authentication, centralized management, and advanced analytics. These features make it an essential tool for organizations striving to safeguard their digital assets and maintain compliance in an ever-changing cybersecurity environment. With its focus on flexibility and user experience, RSA Security 4.3 provides a comprehensive solution that helps organizations navigate the complexities of modern security challenges effectively.