Two Keys Are Better than One but Three Keys Are Better than Two

Public key is powerful because separate keys are used for the separate roles of encryption and decryption. See how use of three (and more) key encryptions could have stopped the NSA and CIA breaches. See the use of Mesh/Recrypt, the first open specification for CRM, demonstrated. The presentation will cover both the applications and the cryptographic techniques used.

Learning Objectives:
1: Understand the next generation of public key protocols.
2: See how proxy re-encryption works and can be applied.
3: Understand opportunity for an open CRM standard.



Dr. Phillip Hallam-Baker VP and Principal Scientist, Comodo Group Inc.

← View more Videos

This document was retrieved from on Sun, 18 Aug 2019 17:16:16 -0400.