One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptographic operations.
This talk will review the varied cryptographic key management and protection technologies available today, including new emerging solutions designed to enhance security and usability in a dispersed, connected digital IT environment.
1: Review the varied cryptographic key management and protection technologies available today.
2: Discuss key criteria for evaluating the security strength of key protection mechanisms.
3: Provide a security and usability assessment of key protection models.Pre-Requisites:Basic knowledge of cryptography/key management.
Smart is a professor in the COSIC group at the KU Leuven. He has held two ERC Advanced grants. He was Vice President of the International Association for Cryptologic Research (2014-2016) and a fellow of the IACR. He is co-founded of Unbound Tech, the Real World Cryptography conference series.