This week we had a discussion on future signature algorithms, one of the items 
raised is that we don’t have HSMs that support many of the algorithms and that 
even if we do, they are not included in FIPS 140-2.

I wanted to take a step back and ask kind of a stupid question: why do we 
require HSMs?  Do we have a threat model that was used as input to the decision 
to require HSMs?

I’m asking because it seems important to understand how we got to this point 
before we consider what items we can drop or alter as we look to revise the 
requirements to support new algorithms.

Thanks,
Peter

_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to