PCI_HSM_Security_Requirements_v4
PCI_HSM_Security_Requirements_v4
June 2016 3.0 PCI Requirements for key-loading devices and HSM remote
administration platform requirements added. Device
Management Information submitted by vendors is now
validated. See PCI PTS HSM - Summary of
Requirements Changes from Version 2.0 to 3.0.
December 2021 4.0 PCI Added new module, “Cloud-based HSMs as a Service –
Multi-tenant Usage Security Requirements.”
Note to Assessors
When protecting this document for use as a form, leave Section 12 (final page of this document)
unprotected to allow for insertion of a device-specification sheet. Under “Tools / Protect Document,”
select “Forms” then “Sections,” and un-check Section 12 as illustrated below.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page i
Contents
Document Changes ..................................................................................................................................... i
Note to Assessors ........................................................................................................................................ i
About This Document ................................................................................................................................. 1
Purpose ..................................................................................................................................................... 1
Scope of the Document ............................................................................................................................. 2
Main Differences from Previous Version ................................................................................................... 2
Foreword ...................................................................................................................................................... 3
Evaluation Domains ................................................................................................................................... 3
Life Cycle ................................................................................................................................................... 3
Related Publications ................................................................................................................................... 4
Required Device Information ..................................................................................................................... 6
Optional Use of Variables in the Device Identifier ..................................................................................... 7
Evaluation Module 1: Core Requirements ............................................................................................. 8
A – Physical Security Requirements ......................................................................................................... 8
B – Logical Security Requirements ........................................................................................................... 9
C – Policy and Procedures ....................................................................................................................... 12
Evaluation Module 2: Key-Loading Devices........................................................................................ 13
D – Key-Loading Devices ......................................................................................................................... 13
Evaluation Module 3: Remote Administration .................................................................................... 14
E – Logical Security .................................................................................................................................. 14
F – Devices with Message Authentication Functionality ...................................................................... 15
G – Devices with Key-Generation Functionality .................................................................................... 16
H – Devices with Digital Signature Functionality................................................................................... 17
Evaluation Module 4: Cloud-based HSMs as a Service – Multi-tenant Usage and Remote
Management Security Requirements ...................................................................................................... 18
I – Cloud Physical Security Requirements ............................................................................................. 18
J – Cloud Logical Security Requirements .............................................................................................. 19
K – Cloud Provisioning / Management Security Requirements ........................................................... 20
Evaluation Module 5: Life Cycle Security Requirements ................................................................... 22
L – Device Security Requirements During Manufacturing ................................................................... 22
M – Device Security Requirements Between Manufacturer and Point of Initial Deployment ........... 24
Compliance Declaration – General Information – Form A .................................................................... 26
Compliance Declaration Statement – Form B ........................................................................................ 27
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page ii
Compliance Declaration Exception – Form C ........................................................................................ 28
Appendix A: Requirements Applicability Matrix ................................................................................. 29
Appendix B: Applicability of Requirements ........................................................................................ 30
Glossary ..................................................................................................................................................... 34
Device-Specification Sheet ...................................................................................................................... 48
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page iii
About This Document
Purpose
HSMs (Hardware Security Modules) play a critical role in helping to ensure the confidentiality and/or data
integrity of financial transactions. Therefore, to help engender trust in the legitimacy of the financial
transactions being supported, it is imperative that HSMs are appropriately secure during their entire
lifecycle. This includes manufacturing, shipment, use, and decommissioning. The purpose of this
document is to provide guidance and direction for appropriately designing HSMs to meet the security
needs of the financial payments industry, and for protecting those HSMs up to the point of initial
deployment. Other security requirements apply at the point of deployment for the management of HSMs
involved with financial payments industry.
This document provides vendors with a list of all the security requirements against which their products
will be evaluated in order to obtain Payment Card Industry (PCI) PIN Transaction Security (PTS)
Hardware Security Module (HSM) device approval.
HSMs may support a variety of payment-processing and cardholder-authentication applications and
processes. The processes relevant to the full set of requirements outlined in this document are:
▪ PIN processing
▪ 3-D Secure
▪ Card verification
▪ Card production and personalization
▪ EFTPOS
▪ ATM interchange
▪ Cash-card reloading
▪ Data integrity
▪ Chip-card transaction processing
▪ Key generation
▪ Key injection
There are many other applications and processes that may utilize general-purpose HSMs, and which may
necessitate the adoption of all or a subset of the requirements listed in this document. However, this
document does not aim to develop a standard for general-purpose HSMs for use outside of applications
such as those listed above that are in support of a variety of payment-processing and cardholder-
authentication applications and processes for the financial payments industry.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 1
Scope of the Document
This document is part of the evaluation-support set that laboratories require from vendors (details of
which can be found in the PCI PTS Device Testing and Approval Guide), and the set may include:
▪ Product samples
▪ Technical support documentation
Upon successful compliance testing by the laboratory and approval by the PCI SSC, the PCI PTS HSM
device will be listed on the PCI SSC website. Commercial information to be included in the Council’s
approval must be provided by the vendor to the test laboratory using the forms in the “Required Device
Information” section of this document.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 2
Foreword
The requirements set forth in this document are the minimum acceptable criteria for the Payment Card
Industry (PCI). The PCI has defined these requirements using a risk-reduction methodology that
identifies the associated benefit when measured against acceptable costs to design and manufacture
HSM devices. Thus, the requirements are not intended to eliminate the possibility of fraud, but to
reduce its likelihood and limit its consequences.
HSMs are typically housed in a secure environment and managed with additional procedural controls
external to the device.
These HSM security requirements were derived from existing ISO, ANSI, and NIST standards; and
accepted/known good practice recognized by the financial payments industry.
Evaluation Domains
Device characteristics are those attributes of the device that define its physical and its logical
(functional) characteristics. The physical security characteristics of the device are those attributes that
deter a physical attack on the device, for example, the penetration of the device to determine its key(s)
or to plant a sensitive data-disclosing “bug” within it. Logical security characteristics include those
functional capabilities that preclude, for example, allowing the device to output a clear-text PIN-
encryption key.
The evaluation of physical security characteristics is very much a value judgment. Virtually any physical
barrier can be defeated with sufficient time and effort. Therefore, many of the requirements have
minimum attack-calculation values for the identification and initial exploitation of the device based upon
factors such as attack time, expertise, and equipment required. Given the evolution of attack techniques
and technology, the PCI payment brands will periodically review these attack calculations for
appropriateness.
Life Cycle
Life cycle management considers how the device is produced, controlled, transported, stored, and used
throughout its life cycle. If the device is not properly managed, unauthorized modifications might be
made to its physical or logical security characteristics.
This document is concerned with the device management for HSM devices only up to receipt at the
point of deployment. Subsequent to receipt of the device at the point of deployment, the responsibility
for the device falls to the acquiring financial institution and its agents⎯e.g., merchants and
processors⎯and is covered by the operating rules of the participating PCI Payment Brands and other
security requirements, such as the PCI PIN Security Requirements.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 3
Related Publications
The following ANSI, ISO, FIPS, NIST, and PCI standards are applicable and related to the information in
this document.
Public Key Cryptography for the Financial Services Industry: Key Agreement ANSI 9.63
and Key Transport Using Elliptic Curve Cryptography
Symmetric Key Cryptography for the Financial Services Industry—Wrapping of ANSI X9.102
Keys and Associated Data
Public Key Cryptography: The Elliptical Curve Digital Signature Algorithm ANSI X9.142
(EDCSA)
Retail Financial Services - Interoperable Secure Key Block Specification ANSI X9.143
Interoperable Secure Key Exchange Key Block Specification for Symmetric ASC X9 TR 31
Algorithms
Interoperable Method for Distribution of Symmetric Keys using Asymmetric ASC X9 TR 34
Techniques: Part 1 – Using Factoring-Based Public Key Cryptography
Unilateral Key Transport
FIPS PUB 140-2: Security Requirements for Cryptographic Modules FIPS
FIPS PUB 140-3: Security Requirements for Cryptographic Modules FIPS
FIPS PUB 186-5: Digital Signature Standard (DSS) FIPS
Personal Identification Number (PIN) Management and Security ISO 9564
Information technology — Security techniques — Message Authentication ISO 9797-1
Codes (MACs) — Part 1: Mechanisms using a block cipher
Financial Services—Key Management (Retail) ISO 11568
Information Technology – Security Techniques – Key Management, Part 2: ISO 11770-2
Mechanisms Using Symmetric Key Management Techniques
Information Technology – Security Techniques – Key Management, Part 3: ISO 11770-3
Mechanisms Using Asymmetric Techniques (RSA and Diffie-Hellman)
Financial Services—Secure Cryptographic Devices (Retail) ISO 13491
Financial Services — Requirements for message authentication using ISO 16609
symmetric techniques
Information Technology – Security techniques – Encryption algorithms – Part 1: ISO/IEC 18033-1
General
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 4
Publication Title Reference
Information Technology – Security techniques – Encryption algorithms – Part 3: ISO/IEC 18033-3
Block Ciphers
Information Technology – Security techniques – Encryption algorithms – Part 5: ISO/IEC 18033-5
Identity Based Ciphers
Note: These documents are routinely updated and reaffirmed. The current versions should be
referenced when using these requirements.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 5
Required Device Information
December 2021
HSM Identifier
Device
Manufacturer:
Marketing Model
Name/Number:
Hardware Version
NumberA:
Use of “x” 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
represents a
Additional versions:
request for field to
be a variable.
Firmware Version
NumberA:
Use of “x” 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
represents a
Additional versions:
request for field to
be a variable.
Firmware Version
Number:
Application
Version Number:
(if applicable)
At the end of this form under “Device Specification Sheet,” attach documentation highlighting device
characteristics, including photos. These photos are to include both external and internal pictures of the
device. The internal pictures are to be sufficient to show the various components of the device.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 6
Optional Use of Variables in the Device Identifier
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 7
Evaluation Module 1: Core Requirements
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 8
B – Logical Security Requirements
All HSMs must meet the following logical requirements.
B3.1 If the device supports applications, the firmware must support the
authentication of applications loaded into the device consistent with
B3.
B4 The device provides secure interfaces that are kept logically separate
by distinguishing between data and control for inputs as well as
between data and status for outputs.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 9
Number Description of Requirement Yes No N/A
B11 The device ensures that if cryptographic keys within the secure
device boundary are rendered invalid for any reason⎯e.g., tamper or
long-term absence of applied power⎯the device will fail in a secure
manner.
B12 The device ensures that each cryptographic key is only used for a
single cryptographic function. It is not possible to encrypt or decrypt
any arbitrary data using any PIN-encrypting key, account-data
encryption, data-encrypting key, or key-encrypting key contained in or
protected by the device. The device does not permit any of the key-
usage information to be changed in any way that allows the key to be
used in ways that were not possible before the change.
B13 There is no mechanism in the device that would allow the outputting
of private or secret clear-text keys, the encryption of a key or PIN
under a key that might itself be disclosed, or the transfer of a clear-
text key from a component of high security into a component of lesser
security. All cryptographic functions implemented shall not output
clear-text critical security parameters (CSPs) to components that
could negatively impact security.
B14 If the device is designed to be used for PIN management, the device
shall meet the PIN-management requirements of ISO 9564. The PIN-
encryption technique implemented in the device is a technique
included in ISO 9564.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 10
Number Description of Requirement Yes No N/A
B17 The operating system/firmware of the device must contain only the
software (components and services) necessary for the intended
operation. The operating system/firmware must be configured
securely and run with least privilege.
B18 The device has the ability to return its unique device ID.
B19 Devices that are designed to include both a PCI mode and a non-PCI
mode must not share secret or private keys between the two modes,
must provide indication as to when the device is in PCI mode and not
in PCI mode, and must require dual authentication when switching
between the two modes.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 11
C – Policy and Procedures
Number Description of Requirement Yes No N/A
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 12
Evaluation Module 2: Key-Loading Devices
D – Key-Loading Devices
Number Description of Requirement Yes No N/A
D3 The device retains no information that could disclose any key that the
device has already transferred into another cryptographic device.
D5 Once the device has been loaded with cryptographic keys, there is no
feasible way in which the functional capabilities of the device can be
modified without causing the automatic and immediate erasure of the
cryptographic keys stored within the device or causing the modification
to be otherwise detected before the device is next used to load a key.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 13
Evaluation Module 3: Remote Administration
E – Logical Security
Number Description of Requirement Yes No N/A
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 14
F – Devices with Message Authentication Functionality
Number Description of Requirement Yes No N/A
F3 If the device uses two keys for MAC generation or verification, the
technique utilized is in accordance with ISO 16609.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 15
G – Devices with Key-Generation Functionality
Number Description of Requirement Yes No N/A
G2 The device will not output any clear-text key except under dual control.
Such dual control is enforced by means such as the following:
▪ The device requires that at least two passwords/authentication
codes be correctly entered within a period of no more than five
minutes before the device will output a key.
▪ The device requires that at least two different, physical keys
(marked “not to be commercially reproduced”) be concurrently
inserted in the unit before it will output a key.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 16
H – Devices with Digital Signature Functionality
Number Description of Requirement Yes No N/A
H2 For audit and control purposes, the binding between the public key and
the identity of the owner of the private key is readily determined by:
▪ Use of public key certificates, where the public key certificate was
obtained from an authorized certificate authority⎯e.g., the
vendor’s PKI; or
▪ Use of public key certificates and appropriate certificate
management procedures; or
▪ Other equivalent mechanisms to irrefutably determine the identity
of the owner of the corresponding private key.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 17
Evaluation Module 4: Cloud-based HSMs as a Service –
Multi-tenant Usage and Remote
Management Security Requirements
I1 The HSM processing element must meet all PCI HSM physical and
logical requirements, including protection of sensitive data to an attack
potential of at least 35 per HSM processing element for identification
and initial exploitation, with a minimum of 15 for initial exploitationA.
I5 The HSM processing element must ensure that clear-text secret and
private keys are processed in execution paths and memory areas that
are isolated from keys of any other HSM Solution Consumer and/or
code that is not included in the scope of the HSM processing element
evaluation.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 18
J – Cloud Logical Security Requirements
Number Description of Requirement Yes No N/A
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 19
K – Cloud Provisioning / Management Security Requirements
Number Description of Requirement Yes No N/A
K8 Where it is possible that more than one HSM processing element may
be operating on the cryptographic keys of the same HSM Solution
Consumer at any one time, these HSM processing elements must be
maintained in an environment meeting at least the security
requirements of a controlled environment.
Note: This requirement is designed to reduce the risk of key
compromise as the cryptographic keys of HSM Solution Consumers
are spread across multiple HSM processing elements for the purpose
of elastic processing.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 20
Number Description of Requirement Yes No N/A
K9 There must be a publicly available security policy that outlines how the
HSM Solution is implemented, what cryptographic services are
provided, how the HSM Solution Consumer and components of the
HSM Solution are authenticated, and how to securely disable or
deprecate the storage of cryptographic keys of specific HSM Solution
Consumers from any or all components of that solution.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 21
Evaluation Module 5: Life Cycle Security Requirements
L2 The firmware and any changes thereafter have been inspected and
reviewed using a documented and auditable process and verified by
the vendor as being free from hidden and unauthorized or
undocumented functions.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 22
Number Description of Requirement Yes No N/A
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 23
M – Device Security Requirements Between Manufacturer
and Point of Initial Deployment
Note: In the following requirements, the device under evaluation is referred to as the “device.”
The device manufacturer, subject to PCI payment brand site inspections, confirms the following. The PCI
test laboratories will validate this information via documentation reviews and by means of evidence that
procedures are properly implemented and used. Any variances to these requirements will be reported to
PCI for review.
Note: “Initial key loading” pertains to the loading of payment transaction keys used by the acquiring
organization.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 24
Number Description of Requirement Yes No N/A
M8 The vendor must maintain a manual that provides instructions for the
operational management of the device. This includes instructions for
recording the entire lifecycle of the device’s security-related
components and the manner in which those components are
integrated into a single device⎯e.g.:
▪ Data on production and personalization
▪ Physical/chronological whereabouts
▪ Repair and maintenance
▪ Removal from operation
▪ Loss or theft
Payment Card Industry PTS HSM Modular Security Requirements, v4.0 December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 25
Compliance Declaration – General Information – Form A
This form and the requested information are to be completed and returned along with the completed
information in the applicable Evaluation Module forms.
Device Manufacturer:
Address 1:
Address 2:
City: State/Province:
Primary Contact:
Position/Title:
E-mail Address:
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Form A December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 26
Compliance Declaration Statement – Form B
Compliance Declaration
Device Manufacturer:
Signature Date
At the end of this form under “Device Specification Sheet,” attach a sheet highlighting device
characteristics, including photos. These photos are to include both external and internal pictures of the
device. The internal pictures are to be sufficient to show the various components of the device.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Form B December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 27
Compliance Declaration Exception – Form C
Device Manufacturer:
Instructions
For any statement, A1-A7, B1-B19, C1, D1-8 or E1-E8, for which the answer was a “NO” or an “N/A,”
explain why the answer was not “YES.”
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Form C December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 28
Appendix A: Requirements Applicability Matrix
Inside evaluation modules, requirements applicability depends upon the functionalities a device under test
provides. Four functionalities have been identified, as shown below.
Functionality Description
HSM This is functionality that must be met by all HSM approval classes as
delineated in Appendix B—i.e., Hardware Security Module, Key-Loading
Device, Remote Administration Platform and Multi-tenant HSM.
Key-Loading Devices This is functionality that must be met by devices that perform key
injection of either clear-text or enciphered keys or their components. The
devices may perform other services such as key generation.
Remote Administration This is for platforms that are used for remote administration of HSMs.
Such administration may include device configuration and key-loading
services.
Multi-tenant HSM This is functionality that must be met by HSMs intended for multi-tenant
usage—i.e., concurrent multi-organizational usage.
Remote-managed HSM This is functionality that must be met by HSMs that will be remotely
managed and are dedicated for usage by a specific organization.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Appendix A December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 29
Appendix B: Applicability of Requirements
Having identified functionalities, a device under evaluation needs to meet or exceed requirements formed
by the union of all requirements applicable to each of the functionalities. Please refer to Appendix A:
Requirements Applicability Matrix.
For compound devices, it is possible that these requirements are met or exceeded by the relevant
module(s) if the corresponding requirements are fully covered; however, it remains up to the testing
house’s judgment to evaluate on a case-by-case basis whether supplementary testing is required.
To determine which requirements apply to a device, the following steps must take place:
1. Identify which of the functionalities the device supports.
2. For each of the supported functionalities, report any marking “X” corresponding to the listed
requirement. “X” stands for “applicable,” in which case the requirement must be considered for
evaluation. In all cases, if a security requirement is impacted, the device must be assessed against
it.
Remote-Man.
Requirement
Key Loading
Multi-tenant
Remote
Admin
HSM
HSM
HSM
Conditions
A2 X X X X
A3 X X X X X
A4 X X X X
A5 X X X X
B2 X X X X
B3 X X X X
B3.1 X X X X
B4 X X X X
B5 X X X X
B6 X X X X X
B7 X X X X
B8 X X X X X
B9 X X X X X
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Appendix B December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 30
Remote-Man.
Requirement
Key Loading
Multi-tenant
Remote
Admin
HSM
HSM
HSM
Conditions
B11 X X X X X
B12 X X X X
B13 X X X
B14 X X X
B15 X X X X
B16 X X X X
B17 X X X X
B18 X X X X
B19 X X X
Key-Loading Devices
D1 X X
D2 X X
D3 X X
D4 X X
D5 X X
E2 X
F2 X
F3 X
F4 X
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Appendix B December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 31
Remote-Man.
Requirement
Key Loading
Multi-tenant
Remote
Admin
HSM
HSM
HSM
Conditions
G2 X X
G3 X X
G4 X
H2 X
I2 X
I3 X
I4 X
I5 X
J2 X X
J3 X X
J4 X X
J5 X X
J6 X
J7 X X
J8 X X
K2 X
K3 X
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Appendix B December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 32
Remote-Man.
Requirement
Key Loading
Multi-tenant
Remote
Admin
HSM
HSM
HSM
Conditions
K5 X
K6 X
K7 X
K8 X
K9 X X
K10 X X
Life Cycle
During Manufacturing
L1 X X X X X
L2 X X X X X
L3 X X X X X
L4 X X X X X
L5 X X X X X
L6 X X X X X
L7 X X X X X
L8 X X X X X
L9 X X X X X
M2 X X X X X
M3 X X X X X
M4 X X X X X
M5 X X X X X
M6 X X X X X
M7 X X X X X
M8 X X X X X
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Appendix B December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 33
Glossary
Term Definition
Accountability The property that ensures that the actions of an entity may be traced
uniquely to that entity.
Advanced Encryption The Advanced Encryption Standard (AES), also known as Rijndael, is a
Algorithm (AES) block cipher adopted as an encryption standard by the U.S. government. It
has been analyzed extensively and is now used worldwide, as was the case
with its predecessor, the Data Encryption Standard (DES).
Algorithm A clearly specified mathematical process for computation; a set of rules,
which, if followed, will give a prescribed result.
ANSI (ANS) American National Standards Institute. A U.S. standards accreditation
organization.
Application(s) Any code or script that is not firmware and can be loaded onto the device.
Application A source code interface that a computer system or program library provides
Programming to support requests for services to be made of it by a computer program.
Interface (API)
Asymmetric See Public Key Cryptography.
Cryptographic
Algorithm
Asymmetric Key Pair A public key and related private key created by and used with a public-key
cryptosystem.
Atomic A single command that has a defined set of input criteria/values and a
defined set of output responses. No intermediate responses, states, or
indications of operation are returned until the defined output is provided. For
example, chaining together a set of common and related commands (MAC
verify, verify PIN, check CVV, check cryptogram, etc.) to minimize traffic on
the HSM link.
Audit Trail A chronological record of system activities that is sufficient to enable the
reconstruction, review, and examination of the sequence of environments
and activities surrounding or leading to each event in the path of a
transaction from its inception to the output of the final results.
Authentication The process for establishing unambiguously the identity of an entity,
process, organization, or person.
Authentication Code See Password.
Authorization The right granted to a user to access an object, resource, or function.
Authorize To permit or give authority to a user to communicate with or make use of
an object, resource, or function.
Availability Ensuring that legitimate users are not unduly denied access to information
and resources.
Base (Master) See Derivation Key.
Derivation Key (BDK)
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 34
Term Definition
Check Value A computed value which is the result of passing a data value through a non-
reversible algorithm. A value used to identify a key without revealing any
bits of the actual key itself.
Check values are computed by encrypting an all-zero block using the key or
component as the encryption key, using the leftmost n-bits of the result;
where n is at most 24 bits (6 hexadecimal digits/3 bytes). This method may
be used for TDEA. TDEA may optionally use, and AES shall use a
technique where the KCV is calculated by MACing an all-zero block using
the CMAC algorithm as specified in ISO 9797-1 (see also NIST SP 800-
38B). The check value will be the leftmost n-bits of the result, where n is at
most 40 bits (10 hexadecimal digits). The block cipher used in the CMAC
function is the same as the block cipher of the key itself. A TDEA key or a
component of a TDEA key will be MACed using the TDEA block cipher,
while a 128-bit AES key or component will be MACed using the AES-128
block cipher.
Ciphertext An encrypted message.
Clear text The intelligible form of an encrypted text or of its elements⎯e.g.,
components.
Clear-text Key An unencrypted cryptographic key, used in its current form.
Compromise In cryptography, the breaching of secrecy and/or security.
A violation of the security of a system such that an unauthorized disclosure
of sensitive information may have occurred. This includes the unauthorized
disclosure, modification, substitution, or use of sensitive data (including
clear-text cryptographic keys and other keying material).
Computationally The property that a computation is theoretically achievable but is not
Infeasible feasible in terms of the time or resources required to perform it with the
current or predicted power of computers.
Conditional Test A test performed by a cryptographic module when the conditions specified
for the test occur.
Confidentiality Ensuring that information is not disclosed or revealed to unauthorized
persons, entities, or processes.
Critical Functions Those functions that, upon failure, could lead to the disclosure of CSPs.
Examples of critical functions include but are not limited to random number
generation, cryptographic algorithm operations, and cryptographic bypass.
Critical Security Security-related information⎯e.g., secret and private cryptographic keys,
Parameters (CSP) and authentication data such as passwords/authentication codes—whose
disclosure or modification can compromise the security of a cryptographic
module.
Cryptographic An explicitly defined continuous perimeter that establishes the physical
Boundary bounds of a cryptographic module and contains all the hardware and
software components of a cryptographic module.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 35
Term Definition
Cryptographic Key A parameter used in conjunction with a cryptographic algorithm that
(Key) determines:
▪ The transformation of clear-text data into ciphertext data,
▪ The transformation of ciphertext data into clear-text data,
▪ A digital signature computed from data,
▪ The verification of a digital signature computed from data,
▪ An authentication code computed from data, or
▪ An exchange agreement of a shared secret.
Cryptographic Key One of at least two parameters having the characteristics (for example,
Component (Key format, randomness) of a cryptographic key that is combined with one or
Component) more like parameters (for example, by means of modulo-2 addition), to form
a cryptographic key. Throughout this document, key component may be
used interchangeably with secret share or key fragment.
Data Encryption A published encryption algorithm used to protect critical information by
Algorithm (DEA) enciphering data based upon a variable secret key. The Data Encryption
Algorithm is defined in ANSI X3.92: Data Encryption Algorithm for
encryption and decrypting data.
Decipher See Decrypt.
Decrypt A process of transforming ciphertext (unreadable) into clear text (readable).
Decryption See Decrypt.
Derivation Key A cryptographic key, which is used to cryptographically compute another
key. A derivation key is normally associated with the Derived Unique Key
Per Transaction key management method.
Derivation keys are normally used in a transaction-receiving (e.g., acquirer)
TRSM in a one-to-many relationship to derive or decrypt the Transaction
(the derived keys) Keys used by a large number of originating
TRSMs⎯e.g., terminals.
DES Data Encryption Standard (see Data Encryption Algorithm). The National
Institute of Standards and Technology Data Encryption Standard, adopted
by the U.S. government as Federal Information Processing Standard (FIPS)
Publication 46, which allows only hardware implementations of the data
encryption algorithm.
Device See Secure Cryptographic Device.
Differential Power An analysis of the variations of the electrical power consumption of a
Analysis (DPA) cryptographic module, using advanced statistical methods and/or other
techniques, for the purpose of extracting information correlated to
cryptographic keys used in a cryptographic algorithm.
Digital Signature The result of an asymmetric cryptographic transformation of data that allows
a recipient of the data to validate the origin and integrity of the data and
protects the sender against forgery by third parties or the recipient.
Double-Length Key A cryptographic key having a length of 112 active bits plus 16 parity bits,
used in conjunction with the TDES cryptographic algorithm.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 36
Term Definition
DTR Derived Test Requirement.
Dual Control A process of using two or more separate entities (usually persons),
operating in concert to protect sensitive functions or information. Both
entities are equally responsible for the physical protection of materials
involved in vulnerable transactions. No single person must be able to
access or to use the materials⎯e.g., cryptographic key. For manual key-
generation, conveyance, loading, storage, and retrieval, dual control
requires split knowledge of the key among the entities. Also see Split
Knowledge.
DUKPT Derived Unique Key Per Transaction: A key-management method that uses
a unique key for each transaction and prevents the disclosure of any past
key used by the transaction originating TRSM. The unique transaction keys
are derived from a base-derivation key using only non-secret data
transmitted as part of each transaction.
ECB Electronic codebook.
EEPROM Electronically erasable programmable read-only memory.
EFP Environmental failure protection.
EFTPOS Electronic funds transfer at point of sale.
Electromagnetic An intelligence-bearing signal, which, if intercepted and analyzed,
Emanations (EME) potentially discloses the information that is transmitted, received, handled,
or otherwise processed by any information-processing equipment.
Electronic Code Book A mode of encryption using a symmetric encryption algorithm, such as
(ECB) Operation DEA, in which each block of data is enciphered or deciphered without using
an initial chaining vector or previously (encrypted) data blocks.
Electronic Key The entry of cryptographic keys into a security cryptographic device in
Loading electronic form using a key-loading device. The user entering the key may
have no knowledge of the value of the key being entered.
Elliptic-curve ECC is an approach to public-key cryptography based on the algebraic
cryptography (ECC) structure of elliptic curves over finite fields. ECC allows smaller keys
compared to non-EC cryptography (based on plain Galois fields) to provide
equivalent security.
Encipher See Encrypt.
Encrypt The (reversible) transformation of data by a cryptographic algorithm to
produce ciphertext⎯i.e., to hide the information content of the data—i.e.,
the process of transforming clear text into ciphertext.
Encrypted Key A cryptographic key that has been encrypted with a key-encrypting key, a
(Ciphertext Key) PIN, or a password/authentication code in order to disguise the value of the
underlying clear-text key.
Encryption See Encrypt.
Entropy The uncertainty of a random variable.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 37
Term Definition
Environmental Failure Use of features to protect against a compromise of the security of a
Protection (EFP) cryptographic module due to environmental conditions outside of the
module's normal operating range.
EPROM Erasable programmable read-only memory.
Error-detection Code Value computed from data and comprised of redundant bits of information
(EDC) designed to detect, but not correct, unintentional changes in the data
Error State A state when the cryptographic module has encountered an error condition
(e.g., failed a self-test). There may be one or more error conditions that
result in a single module error state. Error states may include:
"Hard" errors that indicate an equipment malfunction and may require
maintenance, service, or repair of the cryptographic module, or
Recoverable "soft" errors that may require initialization or resetting of the
module.
Recovery from error states shall be possible except for those caused by
hard errors requiring maintenance, service, or repair of the cryptographic
module.
Evaluation Laboratory Independent entity that performs a security evaluation of the device against
the PCI Security Requirements.
Exclusive-OR Binary addition with no carry, also known as modulo 2 addition, symbolized
as “XOR” and defined as:
0+0=0
0+1=1
1+0=1
1+1=0
FIPS Federal Information Processing Standard.
Firmware Any code within the device that provides security protections needed to
comply with these device security requirements. Other code that exists
within the device that does not provide security, and cannot impact security,
is not considered firmware under these device security requirements.
Hardware (Host) See Secure Cryptographic Device.
Security Module
(HSM)
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 38
Term Definition
Hash A (mathematical) function, which is a non-secret algorithm that takes any
arbitrary-length message as input and produces a fixed-length hash result.
Approved hash functions satisfy the following properties:
▪ One-Way. It is computationally infeasible to find any input that maps to
any pre-specified output.
▪ Collision Resistant. It is computationally infeasible to find any two
distinct inputs⎯e.g., messages⎯that map to the same output.
It may be used to reduce a potentially long message into a “hash value” or
“message digest” which is sufficiently compact to be input into a digital
signature algorithm. A “good” hash is such that the results of applying the
function to a (large) set of values in a given domain will be evenly (and
randomly) distributed over a smaller range.
Hexadecimal A single character in the range 0-9, A-F (upper case), representing a four-
Character bit string.
HSM Processing Physical system that performs operations using user cryptographic keys
Element (working keys) of an HSM Solution Consumer.
HSM Solution The sum of the HSM processing element and HSM virtualization system,
which is exposed to the HSM Solution Consumer as the “Cloud HSM” to
which they interface.
HSM Solution Individual or system authorized to interface with and use an HSM Solution.
Consumer An HSM Solution Consumer may perform multiple roles such as
administration and operations but not those involving the set-up and
maintenance of the underlying HSM Solution.
HSM Solution The entity that sets up and maintains an HSM Solution exposed to one or
Provider more HSM Solution Consumers.
HSM Virtualization System that authenticates the HSM Solution Consumer, provides
System virtualization of functions and HSM API commands, and assigns one or
more HSM processing elements to perform tasks as required. An HSM
processing element and HSM Virtualization System may be a single
physical element or implemented in virtualized/cloud environment elements.
Initialization Vector A binary vector used as the input to initialize the algorithm (a stream or
(IV) block cipher) for the encryption of a clear-text block sequence to increase
security by introducing additional cryptographic variance and to synchronize
cryptographic equipment. The initialization vector need not be secret.
Initial Key Loading Pertains to the loading of payment transaction keys used by the acquiring
organization.
Integrity Ensuring consistency of data; in particular, preventing unauthorized and
undetected creation, alteration, or destruction of data.
Interface A logical entry or exit point of a cryptographic module that provides access
to the module for logical information flows representing physical signals.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 39
Term Definition
Irreversible A non-secret process that transforms an input value to produce an output
Transformation value such that knowledge of the process and the output value does not
feasibly allow the input value to be determined.
ISO International Organization for Standardization. An international standards-
setting organization composed of representatives from various national
standards.
Joint Interpretation A set of documents agreed upon by the British, Dutch, French, and German
Library (JIL) Common Criteria Certification Bodies to provide a common interpretation of
Common Criteria for composite evaluations, attack paths, attack quotations,
and methodology.
KEK See Key-Encrypting Key.
Key See Cryptographic Key.
Key (Secret) Share One of at least two parameters related to a cryptographic key generated in
such a way that a quorum of such parameters can be combined to form the
cryptographic key, but such that less than a quorum does not provide any
information about the key.
Key Agreement A key establishment protocol for establishing a shared secret key between
entities in such a way that neither of them can predetermine the value of
that key. That is, the secret key is a function of information contributed by
two or more participants.
Key Archive Process by which a key no longer in operational use at any location is
stored.
Key Backup Storage of a protected copy of a key during its operational use.
Key Bundle The three cryptographic keys (K1, K2, K3) used with a TDEA mode.
Key Component See Cryptographic Key Component.
Key Deletion Process by which an unwanted key, and information from which the key
may be reconstructed, is destroyed at its operational storage/use location.
Key Destruction Occurs when an instance of a key in one of the permissible key forms no
longer exists at a specific location. Information may still exist at the location
from which the key may be feasibly reconstructed.
Key-distribution host A KDH is a processing platform used in conjunction with HSM(s) that
(KDH) generates keys and securely distributes those keys to the EPP or PED and
the financial-processing platform communicating with those EPPs/PEDs. A
KDH may be an application that operates on the same platform that is used
for PIN translation and financial-transaction processing. The KDH may be
used in conjunction with other processing activities. A KDH shall not be
used for certificate issuance and must not be used for the storage of CA
private keys.
Key-Encrypting A cryptographic key that is used for the encryption or decryption of other
(Encipherment or keys. Also known as a key-encryption or key-exchange key.
Exchange) Key (KEK)
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 40
Term Definition
Key Establishment The process of making available a shared secret key to one or more
entities. Key establishment includes key agreement and key transport.
Key Fragment See Cryptographic Key Component.
Key Generation Creation of a new key for subsequent use.
Key Loading Process by which a key is manually or electronically transferred into a
secure cryptographic device.
Key-Loading Device An SCD that may be used for securely receiving, storing, and transferring
data between compatible cryptographic and communications equipment.
Key-transfer and loading functions include the following:
▪ Export of a key from one secure cryptographic device (SCD) to
another SCD in clear-text, component, or enciphered form;
▪ Export of a key component from an SCD into a tamper-evident
package⎯e.g., blind mailer;
▪ Import of key components into an SCD from a tamper-evident
package;
▪ Temporary storage of the key in clear-text, component, or enciphered
form within an SCD during transfer.
Key Management The activities involving the handling of cryptographic keys and other related
security parameters⎯e.g., initialization vectors, counters⎯during the entire
life cycle of the keys, including their generation, storage, distribution,
loading and use, deletion, destruction, and archiving.
Key Pair Two complementary keys for use with an asymmetric encryption algorithm.
One key, termed the public key, is expected to be widely distributed; and
the other, termed the private key, is expected to be restricted so that it is
known only to the appropriate entities.
Key Replacement Substituting one key for another when the original key is known or
suspected to be compromised or the end of its operational life is reached.
Key Storage Holding of the key in one of the permissible forms.
Key Transport A key establishment protocol under which the secret key is determined by
the initiating party and transferred suitably protected.
Key Usage Employment of a key for the cryptographic purpose for which it was
intended
Key Variant A new key formed by a process (which need not be secret) with the original
key, such that one or more of the non-parity bits of the new key differ from
the corresponding bits of the original key.
Key-Loading Device A self-contained unit that is capable of storing at least one clear-text or
encrypted cryptographic key or key component that can be transferred,
upon request, into a cryptographic module.
Keying Material The data⎯e.g., keys and initialization vectors⎯necessary to establish and
maintain cryptographic keying relationships.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 41
Term Definition
Least Privilege In information security, computer science, and other fields, the principle of
least privilege (also known as the principle of minimal privilege or the
principle of least authority) requires that in a particular abstraction layer of a
computing environment, every module (such as a process, a user, or a
program, depending on the subject) must be able to access only the
information and resources that are necessary for its legitimate purpose.
Legitimate Use Ensuring that resources are used only by authorized persons in authorized
ways.
Manual Key The distribution of cryptographic keys, often in a clear-text form requiring
Distribution physical protection, but using a non-electronic means, such as a bonded
courier.
Manual Key Entry The entry of cryptographic keys into a secure cryptographic device, using
devices such as buttons, thumb wheels, or a keyboard.
Master Derivation Key See Derivation Key.
(MDK)
Master Key In a hierarchy of key-encrypting keys and transaction keys, the highest level
of key-encrypting key is known as a Master Key. May also be known as
Master File Key or Local Master Key, depending on the vendor’s
nomenclature.
Message A cryptographic checksum on data that uses a symmetric key to detect both
Authentication Code accidental and intentional modifications of data (example: a Hash-Based
(MAC) Message Authentication Code).
Multi-tenant HSM These are HSMs intended for multi-tenant usage—i.e., concurrent multi-
organizational usage. These would be typically implemented in connection
with an HSM as a service provider
Non-invasive Attack Attack that can be performed on a cryptographic module without direct
physical contact with components within the cryptographic boundary of the
module.
Non-Reversible See Irreversible Transformation.
Transformation
Operator An individual accessing a cryptographic module or a process (subject)
operating on behalf of the individual, regardless of the assumed role.
Passive Erasure Mechanism that clears data from storage through removal of power.
Password A string of characters used to authenticate an identity or to verify access
authorization.
Personal A numeric personal identification code that authenticates a cardholder in an
Identification Number authorization request that originates at a terminal with authorization only or
(PIN) data capture only capability. A PIN consists only of decimal digits.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 42
Term Definition
Physical Execution The (sub)components and register transfer level (RTL) systems on which
Environment the software is executed. Two processing cores on a single die that share
cache memory and other subsystems would be considered to be within the
same physical execution environment. Separate silicon dies or physical
processors would be an example of separate physical execution
environments.
Physical Protection The safeguarding of a secure cryptographic device or of cryptographic keys
or other critical security parameters using physical means.
Private Key A cryptographic key used with a public key cryptographic algorithm that is
uniquely associated with an entity and is not made public.
In the case of an asymmetric signature system, the private key defines the
signature transformation. In the case of an asymmetric encipherment
system, the private key defines the decipherment transformation.
PRNG Pseudo-random number generator.
PROM Programmable read-only memory.
Pre-operational Self- Test performed by a cryptographic module between the time a
test cryptographic module is powered on or instantiated (after being powered
off, reset, rebooted, cold-start, power interruption, etc.) and transitions to
the operational state.
Pseudo-Random A process that is statistically random, and essentially unpredictable,
although generated by an algorithmic process.
Public Key A cryptographic key, used with a public key cryptographic algorithm,
uniquely associated with an entity, and that may be made public
In the case of an asymmetric signature system, the public key defines the
verification transformation. In the case of an asymmetric encipherment
system, the public key defines the encipherment transformation. A key that
is “publicly known” is not necessarily globally available. The key may only
be available to all members of a pre-specified group.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 43
Term Definition
Public Key A cryptographic technique that uses two related transformations, a public
(Asymmetric) transformation (defined by the public key) and a private transformation
Cryptography (defined by the private key). The two transformations have the property that,
given the public transformation, it is not computationally feasible to derive
the private transformation.
A system based on asymmetric cryptographic techniques can either be an
encipherment system, a signature system, a combined encipherment and
signature system, or a key-agreement system.
With asymmetric cryptographic techniques, such as RSA, there are four
elementary transformations: sign and verify for signature systems, and
encipher and decipher for encipherment systems. The signature and the
decipherment transformation are kept private by the owning entity, whereas
the corresponding verification and encipherment transformations are
published. There exists asymmetric cryptosystems⎯e.g., RSA⎯where the
four elementary functions may be achieved by only two transformations:
one private transformation suffices for both signing and decrypting
messages, and one public transformation suffices for both verifying and
encrypting messages. However, this does not conform to the principle of
key separation and, where used, the four elementary transformations and
the corresponding keys should be kept separate. See Asymmetric
Cryptographic Algorithm.
Public Security Security-related public information whose modification can compromise the
Parameters (PSPs) security of a cryptographic module.
For example, public cryptographic keys, public key certificates, self-signed
certificates, trust anchors, one-time passwords associated with a counter
and internally held date and time.
Note: A PSP is considered protected if it cannot be modified or if its
modification can be determined by the module.
Random The process of generating values with a high level of entropy and which
satisfy various qualifications, using cryptographic and hardware based
“noise” mechanisms. This results in a value in a set that has equal
probability of being selected from the total population of possibilities, hence
unpredictable.
Remote Platforms that are used for remote administration of HSMs. Such
Administration administration may include device configuration and cryptographic key-
Platform (RAP) loading services.
Remote-managed These are HSMs that are designed to support remote management⎯e.g.,
HSM non-console⎯for device configuration and cryptographic key loading.
These HSMs differ from Multi-tenant HSMs in that they are designed for
usage dedicated to a specific organization. They may exist as HSMs owned
and operated by a specific organization or HSMs provided by a third party
as part of an HSM as a service implementation.
Removable Cover A part of a cryptographic module’s enclosure that permits physical access
to the contents of the module.
RNG Random number generator.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 44
Term Definition
ROM Read-only memory.
RSA Public Key Public key cryptosystem that can be used for both encryption and
Cryptography authentication.
Salt A random string that is concatenated with other data prior to being operated
on by a one-way function. A salt should have a minimum length of 64-bits.
Secret Key A cryptographic key, used with a secret key cryptographic algorithm that is
uniquely associated with one or more entities and should not be made
public. A secret key (symmetrical) cryptographic algorithm uses a single
secret key for both encryption and decryption. The use of the term “secret”
in this context does not imply a classification level; rather the term implies
the need to protect the key from disclosure or substitution.
Secret Key A cryptographic algorithm that uses a single, secret key for both encryption
(Symmetric) and decryption.
Cryptographic
Algorithm
Secret Share See Key Share.
Secure Cryptographic A physically and logically protected hardware device that provides a secure
Device set of cryptographic services. It includes the set of hardware, firmware,
software, or some combination thereof that implements cryptographic logic,
cryptographic processes or both, including cryptographic algorithms.
Secure A secure cryptoprocessor is a dedicated computer on a chip or
Cryptoprocessor microprocessor for carrying out cryptographic operations, embedded in a
packaging with multiple physical security measures that give it a degree of
tamper resistance.
Secure Key Loader A self-contained unit that is capable of storing at least one clear-text or
encrypted cryptographic key or key component that can be transferred,
upon request, into a cryptographic module.
Security Policy A description of how the specific module meets these security
requirements, including the rules derived from this standard and additional
rules imposed by the vendor.
Sensitive (Secret) Data that must be protected against unauthorized disclosure, alteration or
Data (Information) destruction, especially clear-text PINs, and secret and private cryptographic
keys, and includes design characteristics, status information, and so forth.
Sensitive Functions Sensitive functions are those functions that process sensitive data such as
cryptographic keys, PINs and passwords.
Sensitive Security Critical security parameters (CSP) and public security parameters (PSP).
Parameters (SSPs)
Sensitive Services Sensitive services provide access to the underlying sensitive functions.
Session Key A key established by a key-management protocol, which provides security
services to data transferred between the parties. A single protocol execution
may establish multiple session keys⎯e.g., an encryption key and a MAC
key.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 45
Term Definition
SHA-1 Secure Hash Algorithm. SHA-1 produces a 160-bit message digest.
SHA-2 A set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-
512). SHA-2 consists of a set of four hash functions with digests that are
224, 256, 384 or 512 bits.
Shared Secret The secret information shared between parties after protocol execution.
This may consist of one or more session key(s), or it may be a single secret
that is input to a key-derivation function to derive session keys.
Simple Power Direct (primarily visual) analysis of patterns of instruction execution (or
Analysis (SPA) execution of individual instructions) in relation to the electrical power
consumption of a cryptographic module for the purpose of extracting
information correlated to a cryptographic operation.
Single-Length Key A cryptographic key having a length of 56 active bits plus 8 parity bits used
in conjunction with the DES cryptographic algorithm.
SK Session key.
Split Knowledge A condition under which two or more entities separately have information
(e.g., key components) that individually convey no knowledge of the
resultant combined information (e.g., a cryptographic key).
SSL Secure Sockets Layer.
Status Information Information that is output from a cryptographic module for the purposes of
indicating certain operational characteristics or states of the module.
Strong Not easily defeated; having strength or power greater than average or
expected; able to withstand attack; solidly built.
Strong Cryptography Cryptography using algorithms and key sizes as defined in Appendix D of
the PCI HSM DTR document.
Symmetric (Secret) A cryptographic key that is used in symmetric cryptographic algorithms. The
Key same symmetric key that is used for encryption is also used for decryption.
Tamper Detection The automatic determination by a cryptographic module that an attempt has
been made to compromise the physical security of the module.
Tamper-Evident A characteristic that provides evidence that an attack has been attempted.
Tamper-Resistant A characteristic that provides passive physical protection against an attack.
Tamper-Responsive A characteristic that provides an active response to the detection of an
attack.
Tampering The penetration or modification of an internal operation and/or insertion of
active or passive tapping mechanisms to determine or record secret data or
to alter the operation of the device.
TDEA See Triple Data Encryption Algorithm.
TDES See Triple Data Encryption Standard.
TECB TDEA electronic codebook.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 46
Term Definition
TLS Transport Layer Security.
TOE Target of evaluation.
Triple Data The algorithm specified in ANSI X9.52, Triple Data Encryption Algorithm
Encryption Algorithm Modes of Operation.
(TDEA)
Triple Data See Triple Data Encryption Algorithm.
Encryption Standard
(TDES)
Triple-Length Key A cryptographic key having a length of 168 active bits plus 24 parity bits,
used in conjunction with the TDES cryptographic algorithm.
Unique Accountability Actions are attributable to a specific person or role.
Unprotected Memory Components, devices, and recording media that retain data for some
interval of time that reside outside the cryptographic boundary of a secure
cryptographic device.
User Individual or (system) process authorized to access an information system
or that makes use of the trust model to obtain the public key of another
user.
An individual or a process (subject) acting on behalf of the individual that
accesses a cryptographic module in order to obtain cryptographic services.
UserID A string of characters that uniquely identifies a user to the system.
Variant of a Key A new key formed by a process (which need not be secret) with the original
key, such that one or more of the non-parity bits of the new key differ from
the corresponding bits of the original key. For example, exclusive-OR’ing a
non-secret constant with the original key.
Verification The process of associating and/or checking a unique characteristic.
Working Key A key used to cryptographically process the transaction. A Working Key is
sometimes referred to as a data key, communications key, session key, or
transaction key.
XOR See Exclusive-OR.
Zeroization (zeroize) The degaussing, erasing, or overwriting of electronically stored data so as
to prevent recovery of the data.
Zeroized The state after zeroization has occurred.
Payment Card Industry PTS HSM Modular Security Requirements, v4.0, Glossary December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 47
Device-Specification Sheet
As instructed under “Required Device Information” and “Compliance Declaration Statement – Form B,”
use this section to attach a device-specification sheet that provides:
1. A description of device characteristics
2. External photos
3. Internal photos, sufficient to show the various components of the device
Payment Card Industry PTS HSM Modular Security Requirements, Device-Specification Sheet December 2021
Copyright 2012-2021. PCI Security Standards Council, LLC. All Rights Reserved. Page 48