It provides
operations such as: hash functions (SHA-1 and HMAC), publickey
encryption and decryption (RSA), signatures, random number
generation, and it offers memory for persistent key storage. It protects
against software attacks but not hardware attacks.