Industry Expert Blogs
Provisioning Devices SecurelyBreakfast Bytes - Paul McLellanAug. 31, 2016 |
Asaf Ashkenazi of Cryptography Research (now part of Rambus) talked about provisioning devices securely at the recent Linley Mobile & Wearables Conference. The heart of all security and cryptography are keys. Security by obscurity is no security. Keys are used to authenticate the device (is it the device that is meant to be connecting?), to authenticate the server (am I connected to the right cloud?), and to protect data on the device from unauthorized access and unauthorized alteration. So the device needs to get the correct keys into it.
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Intel Embraces the RISC-V Ecosystem: Implications as the Other Shoe Drops
- ARM vs RISC-V: Beginning of a new era
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- The Arm Ecosystem: More than Just an Ecosystem, it's Oxygen for SoC Design Teams