Slide 3
Slide 3 text
HSM & Android
Using keys more securely
● Provides standardised interfaces and operations
○ Cryptographic key storage (creation and import)
○ Cryptographic key usage (encryption, singing, attestation)
○ Cryptographic key restrictions (device state, user biometrics)
○ Cryptographic key protection (against tampering, rollbacks)
○ Cryptographic destruction (by expiration, by tampering)
● Less costly to develop for. More costly to attack.
○ Security provided and vetted by a 3rd party
Benefits of HSM
03