Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Secure cryptoprocessor
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== {{Further|Hardware security module#History}} The [[hardware security module]] (HSM), a type of secure cryptoprocessor,<ref name="f5"/><ref name="Gregg"/> was invented by [[Egyptian-American]] engineer [[Mohamed M. Atalla]],<ref name="Stiennon">{{cite web |last1=Stiennon |first1=Richard |title=Key Management a Fast Growing Space |url=https://securitycurrent.com/key-management-a-fast-growing-space/ |website=SecurityCurrent |publisher=IT-Harvest |access-date=21 August 2019 |date=17 June 2014}}</ref> in 1972.<ref name="Langford">{{cite web |last1=Langford |first1=Susan |title=ATM Cash-out Attacks |url=https://h41382.www4.hpe.com/gfs-shared/20140318153228.pdf |website=[[Hewlett Packard Enterprise]] |publisher=[[Hewlett-Packard]] |year=2013 |access-date=21 August 2019}}</ref> He invented a high security module dubbed the "Atalla Box" which encrypted [[Personal identification number|PIN]] and [[Automated teller machine|ATM]] messages, and protected offline devices with an un-guessable PIN-generating key.<ref name="Lazo">{{cite book |last1=BΓ‘tiz-Lazo |first1=Bernardo |title=Cash and Dash: How ATMs and Computers Changed Banking |date=2018 |publisher=[[Oxford University Press]] |isbn=9780191085574 |pages=284 & 311 |url=https://books.google.com/books?id=rWhiDwAAQBAJ&pg=PA284}}</ref> In 1972, he filed a [[patent]] for the device.<ref name="nist">{{cite web |title=The Economic Impacts of NIST's Data Encryption Standard (DES) Program |url=https://www.nist.gov/sites/default/files/documents/2017/05/09/report01-2.pdf |website=[[National Institute of Standards and Technology]] |publisher=[[United States Department of Commerce]] |date=October 2001 |access-date=21 August 2019 |archive-date=30 August 2017 |archive-url=https://web.archive.org/web/20170830020822/https://www.nist.gov/sites/default/files/documents/2017/05/09/report01-2.pdf |url-status=dead }}</ref> He founded [[Atalla Corporation]] (now [[Utimaco Atalla]]) that year,<ref name="Langford"/> and commercialized the "Atalla Box" the following year,<ref name="Lazo"/> officially as the Identikey system.<ref name="Computerworld1978">{{cite journal |title=ID System Designed as NCR 270 Upgrade |journal=[[Computerworld]] |date=13 February 1978 |volume=12 |issue=7 |page=49 |url=https://books.google.com/books?id=fB-Te8d5hO8C&pg=PA49 |publisher=IDG Enterprise}}</ref> It was a [[card reader]] and [[Identity verification service|customer identification system]], consisting of a [[card reader]] console, two customer [[PIN pad]]s, intelligent controller and built-in electronic interface package.<ref name="Computerworld1978"/> It allowed the customer to type in a secret code, which is transformed by the device, using a [[microprocessor]], into another code for the teller.<ref name="Computerworld1976">{{cite journal |title=Four Products for On-Line Transactions Unveiled |journal=[[Computerworld]] |date=26 January 1976 |volume=10 |issue=4 |page=3 |url=https://books.google.com/books?id=3u9H-xL4sZAC&pg=PA3 |publisher=IDG Enterprise}}</ref> During a [[Financial transaction|transaction]], the customer's [[Bank card number|account number was read by the card reader]].<ref name="Computerworld1978"/> It was a success, and led to the wide use of high security modules.<ref name="Lazo"/> Fearful that Atalla would dominate the market, banks and [[credit card]] companies began working on an international standard in the 1970s.<ref name="Lazo"/> The [[IBM 3624]], launched in the late 1970s, adopted a similar PIN verification process to the earlier Atalla system.<ref name="Konheim">{{cite journal |last1=Konheim |first1=Alan G. |title=Automated teller machines: their history and authentication protocols |journal=Journal of Cryptographic Engineering |date=1 April 2016 |volume=6 |issue=1 |pages=1β29 |doi=10.1007/s13389-015-0104-3 |s2cid=1706990 |url=https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html |issn=2190-8516}}</ref> Atalla was an early competitor to [[IBM]] in the banking security market.<ref name="nist"/><ref>{{Cite web |title=Cryptocurrency Charts - Prices.org |url=https://prices.org/ |access-date=2023-02-10 |website=Cryptocurrency Live - Prices.org |language=en-US}}</ref> At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla unveiled an upgrade to its Identikey system, called the Interchange Identikey. It added the capabilities of [[online transaction processing|processing]] [[online transactions]] and dealing with [[network security]]. Designed with the focus of taking [[bank transactions]] [[online]], the Identikey system was extended to shared-facility operations. It was consistent and compatible with various [[packet switching|switching]] [[Computer network|networks]], and was capable of resetting itself electronically to any one of 64,000 irreversible [[Nonlinearity|nonlinear]] [[algorithms]] as directed by [[Card Transaction Data|card data]] information. The Interchange Identikey device was released in March 1976.<ref name="Computerworld1976"/> Later in 1979, Atalla introduced the first [[network processor|network security processor]] (NSP).<ref>{{cite web |last1=Burkey |first1=Darren |title=Data Security Overview |url=http://www.gtug.de/HotSpot2018/download/Presentation/C108-Burkey.pdf |publisher=[[Micro Focus]] |date=May 2018 |access-date=21 August 2019}}</ref> Atalla's HSM products protect 250{{nbsp}}million [[Card Transaction Data|card transactions]] every day as of 2013,<ref name="Langford"/> and secure the majority of the world's ATM transactions as of 2014.<ref name="Stiennon"/>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)