Secure Key Management: Hardware, Tokens, TEEs & MPC Explained ๐Ÿ”

Discover the latest methods for safeguarding cryptographic keys, including hardware security modules, tokens, Trusted Execution Environments, and Multi-Party Computation, in this comprehensive overview by Professor Nigel Smart.

Secure Key Management: Hardware, Tokens, TEEs & MPC Explained ๐Ÿ”
RSA Conference
946 views โ€ข Mar 8, 2019
Secure Key Management: Hardware, Tokens, TEEs & MPC Explained ๐Ÿ”

About this video

Nigel Smart, Professor, KU Leuven

One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptographic operations. This session will review the varied cryptographic key management and protection technologies available today, including new emerging solutions designed to enhance security and usability in a dispersed, connected digital IT environment.Learning Objectives:1: Review the varied cryptographic key management and protection technologies available today.2: Discuss key criteria for evaluating the security strength of key protection mechanisms.3: Provide a security and usability assessment of key protection models.Pre-Requisites:Basic knowledge of cryptography/key management.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

946

Likes

8

Duration

49:48

Published

Mar 8, 2019

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now