Scalable UHD H.264 Encoder - Ultra-High Throughput, Full Motion Estimation engine
Industry Expert Blogs
How to Separate your Cryptographic KeysCrypto Quantique Blog - Amit Deo, PhD, and Senior Cryptography Researcher at Crypto QuantiqueFeb. 14, 2023 |
When designing cryptographic protocols and systems, many guiding principles ought to be respected. Often, these guiding principles are lessons learned from years of attacks and vulnerabilities against supposedly secure systems. Today we will look at one of the most prominent principles in cryptographic design – the principle of key separation. While the ideas behind key separation seem straightforward, we will see that it is not always trivial to spot cases of poorly implemented key separation. To show this, we will look at the example of the recent attacks on the MEGA cloud storage platform that leverage poor key separation to achieve a full breach of security.
What is key separation?
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Intel Embraces the RISC-V Ecosystem: Implications as the Other Shoe Drops
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- The design of the NoC is key to the success of large, high-performance compute SoCs
- What Are the Quantum Computing Threats to Security?