Public Key Authentication PKA
Public Key Authentication (PKA) is a mechanism to authenticate a legit user without introducing any PIN (see Notes below). The authentication is performed by signing… Read More »Public Key Authentication PKA
Public Key Authentication (PKA) is a mechanism to authenticate a legit user without introducing any PIN (see Notes below). The authentication is performed by signing… Read More »Public Key Authentication PKA
SCS3 tool is a specific tool developed by CardContact to manage HSM. Thanks to its interface, Pico HSM can be enhanced with more advanced functionalities,… Read More »Smart Card Shell 3 Tool SCS3
Pico HSM has an internal flash which can store binary data. With this approach, you can save different files, encrypt into the Pico HSM and… Read More »Store Binary Data
Pico HSM supports AES secret key generation and CBC encryption/decryption. However, OpenSC does not provide AES support for sc-hsm driver. Instead, the sc-hsm-embedded module is used. First,… Read More »AES
Pico HSM supports secure backup and restore. This mechanism is used to export a private key securely and restore it into another Pico HSM or… Read More »Backup Keys
Pico HSM allows you generating lots of keypairs (public and private). It supports different types of cryptographic keys and thanks to PKCS11 interface, it can… Read More »Generate and Sign a Certificate
Pico HSM supports in place signatures of arbitrary data. It supports the following algorithms: Typically, there are two major signature algorithms: RSA and ECDSA. RSA… Read More »Create RSA Signatures
Pico HSM supports in place signatures of arbitrary data. It supports the following algorithms: Typically, there are two major signature algorithms: RSA and ECDSA. RSA… Read More »Create ECDSA Signatures
Pico HSM allows you generating multiple keypair (public and private). It supports different types of cryptographic keys and thanks to PKCS11 interface, it can be… Read More »Keypair Generation and Key Management
Pico HSM supports in place decryption of arbitrary data with a symmetric ECDH key. It supports the following algorithms: Encrypt and decrypt is a fundamental… Read More »Encryption and Decryption with ECDH