RSA Security 5.2.2 manual Using Cryptographic Hardware

Models: 5.2.2

1 376
Download 376 pages 13.91 Kb
Page 171
Image 171

Using Cryptographic Hardware

To implement this, the hardware accelerator might require you to call its key- wrapping routines to build a digital envelope. When you request the key in order to store it for later use, the hardware could return a handle to the key. But if you give that data to another cryptographic package, the key will mean nothing.

So, once you build a key (symmetric or private) on a hardware device, it is possible that only that hardware device will be able to use that key. Therefore, you should use hardware accelerators only if you thoroughly understand their use.

C h a p t e r 4 U s i n g C r y p t o - C

1 4 9

Page 171
Image 171
RSA Security 5.2.2 manual Using Cryptographic Hardware