HSM (Hardware Security Module) - Netz Technology solutions (2024)

The HSM provides an extensive range of functions including support for key management, PIN generation, encryption and verification, and Message Authentication Code (MAC) generation and verification. The use of HSM is a requirement for compliance with American National Standards Institute (ANSI) TG-3 PIN protection and key management guidelines, as well as most card association and network security mandates.

Types of Keys Used by the HSM

HSM never works with plain keys, all the keys it processes are encrypted under other Key Encryption Key (KEK), keys. The LMK is KEK which is securely stored in the secure environment, HSM. The main idea of HSM is, that you cannot get real LMK key value, respectively, you cannot get the real working key plain value. All the keys you are using with HSM are cryptograms.

Key Management

  1. LMK – Local Master Key

The Local Master Key (LMK) is the master key for the HSM and is used for protecting all other keys used by the institution concerned. As the transaction volume increases, Banks usually deploy multiple HSMs. That doesn’t mean there are multiple LMKs. There is only one LMK per site. It is the mother of all keys for each institution.

Three clear key components are generated by 3 officials of the institution concerned. Each of these clear components are kept by a separate custodian that works for that institution and entered into HSM using a smart card and a Key Check Value is created. During this operation each creates a smart card copy, as a fall-back. Each custodian enters their component to the HSM which combines them to form the ZMK. Most typically, the clear components are simply XORed to form the LMK.

Watch the following 3 videos to know the way LMK is generated.

  1. https://www.youtube.com/watch?v=f_ucKijZ6uY (format 3 smart cards and 3 fall-back cards)

  2. https://www.youtube.com/watch?v=4EP3sB400a4 (each officer separately enters his/her clear key component into his/her smartcard and its copy)

  3. https://www.youtube.com/watch?v=7l8QncIpWlE (using smartcards 3 officers enter their components to generate final LMK pairs, which are stored only in HSM)

The three smart cards are kept separately by each of the officers in a safe place (preferably Bank Locker), and taken out for re-entry, should a need arise or an additional HSM is purchased.

Security for key management is ensured by the use of an enforced key hierarchy and the use of multiple Local Master Key (LMK) pairs. The HSM can use Smart Cards (compatible with ISO 7816) to provide a convenient means of handling LMKs.

Local Master Keys are a sets of 40 DES keys. They are stored securely in the HSM making it very difficult for an attacker to gain access to them. LMKs are the only keys that are stored in the HSM.

LMKs are not used for encrypting data, but are instead used to encrypt and decrypt other keys as these enter or leave the HSM. LMKs are used to ensure that even if the data traffic between the HSM and an application is recorded, the clear values of any exchanged keys are not compromised.

LMKs come in pairs and the Thales HSM contains several LMK pairs. Different LMK pairs are used to encrypt/decrypt different types of security keys. LMK pairs are identified by two numbers, for example LMK pair 04-05, LMK pair 14-15, etc. See the diagram below.

HSM (Hardware Security Module) - Netz Technology solutions (1)

for more details: https://github.com/snowch/hsm-guide/blob/master/book.md#pin-block-creation-clear-pin-blocks

  1. Zone Master Key

Sometimes, Banks need to transmit keys to other parties, e.g., Visa or MasterCard to exchange some encrypted data like PIN-blocks. In that case Banks should use another KEK called ZMK.

A Zone Master Key (ZMK) is a key-encrypting key which is distributed manually between two (or more) communicating sites, within a shared network, in order that further keys can be exchanged automatically (without the need for manual intervention). The ZMK is used to encrypt keys of a lower level for transmission. For local storage, a ZMK is encrypted under one of the LMK pairs.

Within the VISA environment this is known as a ZCMK.

  1. Zone PIN Key

A Zone PIN Key (ZPK) is a data encrypting key which is distributed automatically and is used to encrypt PINs for transfer between communicating parties (for example, between acquirers and issuers). For transmission, a ZPK is encrypted under a ZMK; for local storage it is encrypted under one of the LMK pairs.

  1. Terminal Master Key

A Terminal Master Key (TMK) is a key-encrypting key which is distributed manually, or automatically under a previously installed TMK. It is used to distribute data-encrypting keys, within a local (non-shared) network, to an ATM or POS terminal or similar. The TMK is used to encrypt other TMKs or keys of a lower level for transmission. For local storage, a TMK is encrypted under one of the LMK pairs.

  1. Terminal PIN Key

A Terminal PIN Key (TPK) is a data-encrypting key which is used to encrypt PINs for transmission, within a local network, between a terminal and the terminal data acquirer. For transmission, a TPK is encrypted under a TMK; for local storage it is encrypted under one of the LMK pairs.

  1. Terminal Authentication Key

A Terminal Authentication Key (TAK) is a data-encrypting key which is used to generate and verify a Message Authentication Code (MAC) when data is transmitted, within a local network, between a terminal and the terminal data acquirer. For transmission, a TAK is encrypted under a TMK or ZMK; for local storage it is encrypted under one of the LMK pairs.

  1. PIN Verification Key

A PIN Verification Key (PVK) is a data-encrypting key which is used to generate and verify PIN verification data and thus verify the authenticity of a PIN. For transmission, a PVK is encrypted under a TMK or under a ZMK; for local storage, it is encrypted under one of the LMK pairs.

  1. Card Verification Key

A Card Verification Key (CVK) is similar to a PIN Verification Key, but for Card information instead of a PIN.

The HSM supports Master / Session Key and Transaction Key management techniques.

HSM (Hardware Security Module) - Netz Technology solutions (2024)

FAQs

What is a hardware security module HSM used for? ›

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.

What are the disadvantages of HSM? ›

2 Disadvantages of HSMs

Despite their benefits, HSMs also have some disadvantages that you should be aware of. One of the main disadvantages is that they are expensive and complex to deploy and maintain. HSMs require specialized hardware, software, and personnel to operate and manage them.

What are the main advantages of using an HSM over server based key and certificate management services? ›

Advantages of Using HSMs

High levels of trust and authentication. Tamper-resistant, tamper-evident, and tamper-proof systems to provide extremely secure physical systems. Providing the highest level of security for sensitive data and cryptographic keys on the market.

What is the difference between hardware security module HSM and TPM? ›

HSMs are different from trusted platform modules (TPMs) even though both are physical devices and involve data encryption. An HSM is a removable unit that runs on its own, while a TPM is a chip on your motherboard that can encrypt an entire laptop or desktop disk.

How to use an HSM? ›

Using an HSM with your own CA

Configure your CA to communicate with an HSM using PKCS11 and create a Label and PIN . Then use your CA to generate the private key and signing certificate for each node, with the private key generated inside the HSM. Use your CA to build the peer or ordering node MSP folder.

When should you use a HSM Why? ›

When you use an HSM to protect cryptographic keys, you add a robust layer of security, preventing attackers from finding them. nShield HSMs are specially designed to establish a root of trust, safeguarding and managing cryptographic keys and processes within a certified hardware environment.

What is risk with HSM? ›

HSM availability and loss of stored keys are the primary risks with an HSM integration. The Vault makes an HSM call for every object call.

Do I need a hardware security module? ›

Why should I use an HSM? Cryptographic operations like encryption and digital signing are worthless if the private keys they use are not well protected. Attackers today have grown much more sophisticated in their ability to locate private keys that are stored or are in use.

How much does an HSM cost? ›

These solutions have a costly overhead a Gemalto HSM can be ~$29,000, Thales can be ~$9,500, and Utimaco can be ~$15,000. In addition, you need to store these HSM devices in a secure location which can cost an arm and a leg or even more.

What are the two types of HSM? ›

While the General Purpose HSM offers general cryptographic commands, the Financial HSM offers more specific cryptographic commands so that information does not leave the HSM. Finally, the security standards met by each one are also different, as we have seen above.

How to connect HSM? ›

Configure the firewall to connect to the HSM partition.
  1. Select. HSM. and refresh ( ) the display.
  2. Setup HSM Partition. (Hardware Security Operations settings).
  3. Enter the. Partition Password. to authenticate the firewall to the partition on the HSM.
  4. Click. OK. .

Are certificates stored on HSM? ›

HSMs allow you to store your organization's cryptographic keys and create the PKI certificates that are necessary to enable user, device and software authentication. Furthermore, the authentication processes themselves can occur within the HSM's internal environment.

How does HSM module work? ›

The encrypted data is transmitted over a network, and the HSM is responsible for decrypting the data upon receipt. The HSM is designed to be tamper-resistant and prevents unauthorized access to the encryption keys stored inside.

Is HSM hardware or software? ›

Hardware Security Modules (HSMs) are hardened, tamper-resistant hardware devices that strengthen encryption practices by generating keys, encrypting and decrypting data, and creating and verifying digital signatures. Some hardware security modules (HSMs) are certified at various FIPS 140-2 Levels.

Why is HSM more secure? ›

Onboard secure key management: HSMs deliver the highest level of security because the usage of cryptographic keys is always performed in hardware. The HSMs are secure and tamper resistant devices to protect the stored keys. No whole key can be extracted or exported from an HSM in a readable format.

What is the point of a HSM? ›

Hardware Security Modules (HSMs) are hardened, tamper-resistant hardware devices that strengthen encryption practices by generating keys, encrypting and decrypting data, and creating and verifying digital signatures.

Why is HSM needed? ›

What are the main benefits of using HSM? Safety, simplicity and performance. An HSM securely protects your cryptographic keys, but at the same time makes them easily accessible from your application and provides you with a high availability and performance of crypto operations.

What is a general purpose HSM? ›

General Purpose HSMs are very flexible to use, as they can be used in any application that uses cryptographic keys that do not require the additional functions that must be used in the Financial HSM. General Purpose HSMs comply with numerous safety standards such as these below: PCI DSS. PCI 3DS (Server 3DS).

What is the use case of HSM? ›

HSMs are physical devices that perform cryptographic operations such as key generation and storage, identities and database management, key exchange and encryption, and decryption to ensure the safety of business secrets.

Top Articles
Welcome Letter to New Employees: 6 Steps + Template | Eddy
COD Mobile 🏆Ranked Mode Explained
Www.craigslist Virginia
The UPS Store | Ship & Print Here > 400 West Broadway
Www.metaquest/Device Code
Practical Magic 123Movies
Toyota gebraucht kaufen in tacoma_ - AutoScout24
Flights to Miami (MIA)
Fcs Teamehub
Craigslist/Phx
Valentina Gonzalez Leaked Videos And Images - EroThots
What Is A Good Estimate For 380 Of 60
Watch TV shows online - JustWatch
Worcester On Craigslist
Sivir Urf Runes
Straight Talk Phones With 7 Inch Screen
Cyndaquil Gen 4 Learnset
Razor Edge Gotti Pitbull Price
Napa Autocare Locator
Adam4Adam Discount Codes
Iu Spring Break 2024
Union Ironworkers Job Hotline
The Menu Showtimes Near Regal Edwards Ontario Mountain Village
CDL Rostermania 2023-2024 | News, Rumors & Every Confirmed Roster
Reptile Expo Fayetteville Nc
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Roane County Arrests Today
Rs3 Ushabti
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Harbor Freight Tax Exempt Portal
Mikayla Campinos: Unveiling The Truth Behind The Leaked Content
How to Use Craigslist (with Pictures) - wikiHow
Nail Salon Open On Monday Near Me
Bt33Nhn
How to Get Into UCLA: Admissions Stats + Tips
El agente nocturno, actores y personajes: quién es quién en la serie de Netflix The Night Agent | MAG | EL COMERCIO PERÚ
Rise Meadville Reviews
Iban's staff
AP Microeconomics Score Calculator for 2023
Acadis Portal Missouri
Labyrinth enchantment | PoE Wiki
Has any non-Muslim here who read the Quran and unironically ENJOYED it?
John M. Oakey & Son Funeral Home And Crematory Obituaries
Blue Beetle Showtimes Near Regal Evergreen Parkway & Rpx
Ups Authorized Shipping Provider Price Photos
Canvas Elms Umd
Lebron James Name Soundalikes
Pronósticos Gulfstream Park Nicoletti
Les BABAS EXOTIQUES façon Amaury Guichon
Guidance | GreenStar™ 3 2630 Display
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5760

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.