Skip to main content

Security Modules

For applications requiring additional security features, various security modules can be integrated with the Compute Blade. These modules provide hardware-based security and encryption capabilities.

ZYMKEY4 for Raspberry Pi

The ZYMKEY4 for RPI is a hardware security module that can be used to add enhanced security to your Compute Blade setup.

Features

Hardware Security

  • Hardware-based encryption and authentication
  • Secure key generation and storage
  • Tamper detection and response
  • True random number generation
  • Secure boot capabilities

Installation

Physical Installation

  1. Power down your Compute Blade completely
  2. Locate the GPIO header on your Compute Blade
  3. Align the ZYMKEY4 with pins 1-10 of the GPIO header
  4. Press down firmly to ensure good connection
  5. The ZYMKEY4 LED should illuminate when powered on

Programming Examples

import zymkey

# Generate a key pair
zymkey.client.gen_key_pair('my_keypair')

# Sign some data
message = "Hello, secure world!"
signature = zymkey.client.sign(message, 'my_keypair')

# Verify the signature
is_valid = zymkey.client.verify(message, signature, 'my_keypair')
print(f"Signature valid: {is_valid}")

Use Cases

IoT Security

  • Device authentication in IoT networks
  • Secure firmware updates over-the-air
  • Data encryption for sensor readings
  • Network security for edge devices

Industrial Applications

  • Equipment authentication in manufacturing
  • Secure data logging for compliance
  • Access control for industrial systems
  • Supply chain verification

Financial & Healthcare

  • Payment processing at point-of-sale
  • Patient data protection in medical devices
  • Compliance with HIPAA, PCI-DSS standards
  • Audit trail generation and verification

Troubleshooting

Common Issues:

  • LED not lighting: Check GPIO connection and power supply
  • Software installation fails: Ensure internet connection and run as sudo
  • Key generation errors: Verify ZYMKEY4 is properly locked and initialized
  • Performance issues: Check for conflicting GPIO usage

Support Resources:

Security Notice

Always follow proper security practices when handling cryptographic keys and sensitive data. The ZYMKEY4 provides hardware-level security, but proper implementation and key management are essential.