Menu

Key Management and Protection: Evaluation of Hardware, Tokens, TEEs and MPC

One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptographic operations. This session will review the varied cryptographic key management and protection technologies available today, including new emerging solutions designed to enhance security and usability in a dispersed, connected digital IT environment.Learning Objectives:1: Review the varied cryptographic key management and protection technologies available today.2: Discuss key criteria for evaluating the security strength of key protection mechanisms.3: Provide a security and usability assessment of key protection models.Pre-Requisites:Basic knowledge of cryptography/key management.

Speaker

Headshot

Nigel Smart Professor, KU Leuven

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/key-management-and-protection-evaluation-of-hardware-tokens-tees-and-mpc on Fri, 24 May 2019 21:03:35 -0400.