How to Keep Your Secret (Key)?
During the presentation I will start by exploring low-level attacks to obtain secret keys:
- Examining the Meltdown and Spectre attacks, which exploit hardware architectural features,
- Understanding Side Channel Attacks on AES based on chip power consumption,
- Analyzing example of poor key management and quality in WEP WiFi networks.
After that, I will explain how to secure cryptography keys by:
- proper generation (entropy and random number generator)
- safe exchange (Diffie-Helman and Quantum key approach)
- proper distribution (centralized vs distributed -> PKI vs blockchain approach)
- secure storage (in embedded devices, servers, hardware wallets)
Finally, I will provide an example of an IoT device to illustrate how the above features are demonstrated in real-world application.
What is the primary technical reason the speaker gives for why Meltdown and Spectre can leak secrets, and why are software-only fixes imperfect?
Thanks Pawel for the presentation. In terms of actual hardware solution, what exactly is important to look fore when storage keys in an embedded system (microcontroller-based) ? Between the dual core 'pseudo hardware isolation' of things like the STM32WL, the ARM definition for Trustzone-M and the external secure element components, it's hard to figure out what is what and in which case each solution makes more sense.









I really enjoyed your presentation and found it informative. Thank you!