TOP

Hardware Security Modules: RFID Projects? A Sure Thing!

SCHREINER PRINTRUST

Hardware Security Modules: RFID Projects? A Sure Thing!

In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team—the experts in security and authentication—is now using hardware security modules (HSMs) to offer customers comprehensive protection.

The small dark box looks alittle like a normal industrial PC but the interior of this device is anything but normal: It is part of a hardware security module (HSM) with which cryptographic keys are generated, stored, and managed. HSMs protect sensitive data against unauthorized access and tampering. Unlike strictly software-based solutions HSMs offer higher protection because the sensitive information is stored in specialty hardware (the “normal” industrial PC) that is highly secured and protected against unauthorized access.

This system clearly differs from conventional ones: symmetric encryption uses only one key for encryption and decryption. That is fast and efficient but if the key gets into the wrong hands the data are in acute jeopardy. Asymmetric encryption uses a pair of keys: one for encryption and one for decryption. That offers higher security but, accordingly, requires higher computing power. Using HSMs, all commercially available encryption methods can be professionally implemented.

So that the clear response to unauthorized access to sensitive data is: Access denied!

“The security in a project is always only as strong as the weakest link in the total concept. We’re in the fortunate position of being able to offer our customers a holistic security concept with auditable standards,” says Dr. Kai Schnapauff, President of Schreiner PrinTrust. “In addition to the hardware security modules, it encompasses the integration of suitable, secure RFID chips and of course our in-house ISO 14298 certified security production. As a result, the sensitive keys enjoy constant highly secure protection against access—from external as well as from internal parties.” Maximum security, trustworthiness, and reliability are indispensable components in times where data security is becoming increasingly important. The implementation of the hardware security modules shows that Schreiner Group takes the challenges of digital security seriously and proactively tackles them. For customers, that means comprehensive protection on the highest level.