Ceremonies Design for PKI's Hardware Security Modules

  • Martina J
  • Souza T
  • Custódio R
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Ceremonies are a useful tool to HSMs in PKI environments. They state operational procedures and usage scenarios. Their correct construction can lead to a safer operation. This paper presents basic ceremony procedures to manage the life cycle of cryptographic keys and ideas of requirements needed to assure security throughout the usage of ceremonies in the context of an HSM It presents ceremonies to make the implementing the OpenHSM protocols. OpenHSM protocol operational establishing basic building blocks that can be used by any PKI application based in an HSM. Our main contributions are the re-usage of ceremony phases and a survey on formal methods to verify them.

Cite

CITATION STYLE

APA

Martina, J. E., Souza, T. C. S. de, & Custódio, R. F. (2022). Ceremonies Design for PKI’s Hardware Security Modules (pp. 115–128). Sociedade Brasileira de Computacao - SB. https://doi.org/10.5753/sbseg.2009.20627

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free