A tamper-resistant security module (TRSM) is a device that incorporates physical protections to prevent compromise of cryptographic security parameters that it contains.
There are varying levels of protection afforded by TRSMs:
A TRSM is usually also a hardware security module (HSM).
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.
![]() | This cryptography-related article is a stub. You can help Wikipedia by expanding it. |
A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.
File verification is the process of using an algorithm for verifying the integrity of a computer file. This can be done by comparing two files bit-by-bit, but requires two copies of the same file, and may miss systematic corruptions which might occur to both files. A more popular approach is to generate a hash of the copied file and comparing that to the hash of the original file.
Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity cards. The main goal of security printing is to prevent forgery, tampering, or counterfeiting. More recently many of the techniques used to protect these high-value documents have become more available to commercial printers whether they are using the more traditional offset and flexographic presses or the newer digital platforms. Businesses are protecting their lesser-value documents such as transcripts, coupons and prescription pads by incorporating some of the features listed below to ensure that they cannot be forged or that alteration of the data cannot occur undetected.
The Federal Information Processing Standard (FIPS) Publication 140-2,, is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001 and was last updated December 3, 2002.
A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. This was the first type of intrusion detection software to have been designed, with the original target system being the mainframe computer where outside interaction was infrequent.
Closures are devices and techniques used to close or seal container such as a bottle, jug, jar, tube, can, etc. Closures can be a cap, cover, lid, plug, etc.
A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Security alarms in residential areas show a correlation with decreased theft. Car alarms likewise help protect vehicles and their contents. Prisons also use security systems for control of inmates.
Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings or other techniques may be tamper indicating.
The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. As of December 2016, the current version of the standard is FIPS 140-2, issued on 25 May 2001. Its successor FIPS 140-3 was approved on March 22, 2019 and will become effective on September 22, 2019. FIPS 140-3 testing will begin September 22, 2020. After FIPS 140-3 testing begins, FIPS 140-2 testing will continue for at least a year, making the two standards to coexist for some time.
Tampering may refer to:
In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction data are still protected since the next or prior keys cannot be determined easily. DUKPT is specified in ANSI X9.24 part 1.
Tamperproofing is a term sometimes misused for a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, time, etc., the term "tamperproof" is a misnomer.
Computer security software or cybersecurity software is any computer program designed to enhance information security.
A tamper-evident band or security ring serves as a tamper resistant or tamper evident function to a screw cap, lid, or closure. The term tamper proof is sometimes used but is considered a misnomer given that pilfering is still technically possible
Security seals are mechanisms used to seal shipping containers in a way that provides tamper evidence and some level of security. Such seals can help to detect theft or contamination, either accidental or deliberate. Security seals are commonly used to secure truck trailers, vessel containers, chemical drums, airline duty-free trolleys and utility meters. Typically they are considered an inexpensive way of providing tamper evidence of intrusion into sensitive spaces.
Currency packaging includes several forms of packing cash for easy handling and counting. Many systems use standard color-coding or are marked to indicate the amount in the package.
A security bag is a heavy duty bag used to contain high-value products or documents or legally sensitive items. Envelopes with security features are called security envelopes as well as security bags. Cash for deposit in a bank is often placed in a special deposit bag with security features. When used to contain items related to a crime, special evidence bags are used. Authentication of signatures and chain of custody are often required.
Security tape is a type of adhesive tape used to help reduce shipping losses due to pilfering and reduce tampering or product adulteration. Often it is a pressure sensitive tape or label with special tamper resistant or tamper evident features. It can be used as a ‘’security seal’’ in addition to a container closure or can be used as a security label. They are sometimes used as or with authentication products and can be an anti-pilferage seal.