1, current key storage
hardware - NIST[3]
software- windows DPI [2] apple key chain[4] cloud storage [6] [8]
2, kerborus [5]
3, Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules [9]
[1] http://stackoverflow.com/questions/50142/symmetric-key-storage
[2] http://msdn.microsoft.com/en-us/library/ms995355.aspx
[3] NIST key storage
[4] http://en.wikipedia.org/wiki/Keychain_%28Apple%29
[5] http://www.cmf.nrl.navy.mil/krb/kerberos-faq.html#whatis
[6] https://developer.apple.com/library/safari/documentation/iphone/conceptual/safarijsdatabaseguide/name-valuestorage/name-valuestorage.html
[7] https://developer.apple.com/library/mac/documentation/General/Conceptual/iCloudDesignGuide/Chapters/DesigningForKey-ValueDataIniCloud.html
[8] http://tech-beta.slashdot.org/story/07/03/01/237209/secure-private-key-storage-for-unix
[9] http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1330
没有评论:
发表评论