Home >

Product Overview > Luna HSM Authentication Variants > Comparing Password and PED Authentication

Comparing Password and PED Authentication

The following table outlines the key differences between PED and password authentication.

Feature Password-authenticated HSM PED-authenticated HSM
Ability to restrict access to cryptographic keys

knowledge of Partition Password is sufficient  

for backup/restore, knowledge of partition domain password is sufficient

ownership/possession of the black PED Key is mandatory to modify keys, gray PED Key to use without modifying

for backup/restore, possession of both black and red PED Keys is necessary  

the Crypto User role is available to restrict access to usage of keys, with no key management

option to associate a PED PIN (something-you-know) with any PED Key (something you have), imposing a two-factor authentication requirement on any role

Dual or Multi-person Access Control

not available  

Mof N (split-knowledge secret sharing) requires "M" different holders of portions of the role secret, in order to authenticate to an HSM role - can be applied to any, all, or none of the administrative and management operations required on the HSM  

prevents unilateral action by a single actor  

Key-custodian responsibility

linked to password knowledge, only  

linked to partition password knowledge,  

linked to black PED Key(s) ownership

 

Roles limited to:

Appliance admin (SafeNet Network HSM only)

HSM Admin (SO)

Partition SO

Partition Crypto Officer  

Partition Crypto User

Available roles:  

Appliance admin  

HSM Admin (Security Officer)

Domain (Cloning / Token-Backup)

Secure Recovery

Remote PED

Partition Owner (or Crypto Officer)

Crypto User (usage of keys only, no key management)

for all roles, two-factor authentication (selectable option) and MofN (selectable option)

Two-factor authentication

not available  

physical PED Key per role  

optional to impose requirement for PED PIN (multi-digit code input at PED keypad), different for each role, can also be different for each legitimate copy of a PED Key

Two-factor authentication for remote access

not available  

Remote PED and orange (Remote PED Vector) PED Key deliver highly secure remote management of HSM, including remote backup  

Location Authentication can be input locally, or from a remote terminal (RDP, SSH, etc.)   Authentication requires local physical connection, or pre-configured Remote PED link  
Security and Handling Advantage  

Easy/quick to change if/when necessary (for personnel change, suspected compromise, etc.).  

Can comply with an organization's password-aging policy without hardship.  

No written record of a complicated password, that might be compromised.

Access and handling of physical devices (PED Keys) can be tracked and controlled (who has, when used, etc.).

Duplication and promulgation can be prevented by physical security measures.

If PED PIN option is used, easy to block view of PED keypad input from bystanders or cameras.

If PED PIN option is used, no exposure of PED PINs outside the PED (does not exist on a bus, is not sent over any communication channel).  

Security and Handling Disadvantage  

Password vulnerable to

watchers (or cameras) observing password being typed)
mal-ware (keystroke loggers, etc.)

secure PWs are obscure and must be written; record must be securely stored

difficult to know who might have seen or been told a password

Requires hands-on, physical action by personnel to perform changes of authentication secrets (in case of compromise or in conformance with organizational policy).  

Scheduled/mandated "password-change" cycles in an organization can be logistically intensive when HSMs share PED Key secrets.

Separation of roles Not possible to enforce unless secret holders are never allowed to meet or communicate.   Physical and procedural control of physical PED Keys and their handling enforces separation of roles.