Home > On-Demand Archives > Theatre Talks >
How to Keep Your Secret (Key)?
Pawel Gielmuda - Watch Now - EOC 2023 - Duration: 34:34
During the presentation I will start by exploring low-level attacks to obtain secret keys:
- Examining the Meltdown and Spectre attacks, which exploit hardware architectural features,
- Understanding Side Channel Attacks on AES based on chip power consumption,
- Analyzing example of poor key management and quality in WEP WiFi networks.
After that, I will explain how to secure cryptography keys by:
- proper generation (entropy and random number generator)
- safe exchange (Diffie-Helman and Quantum key approach)
- proper distribution (centralized vs distributed -> PKI vs blockchain approach)
- secure storage (in embedded devices, servers, hardware wallets)
Finally, I will provide an example of an IoT device to illustrate how the above features are demonstrated in real-world application.
Thanks Pawel for the presentation. In terms of actual hardware solution, what exactly is important to look fore when storage keys in an embedded system (microcontroller-based) ? Between the dual core 'pseudo hardware isolation' of things like the STM32WL, the ARM definition for Trustzone-M and the external secure element components, it's hard to figure out what is what and in which case each solution makes more sense.
I really enjoyed your presentation and found it informative. Thank you!