Artwork

A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys

40:25
 
Megosztás
 

Manage episode 513308563 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encryption and Diffie-Hellman (DH) being key for establishing shared secret keys. Modern ciphers like Elliptic Curve Cryptography (ECC), however, offer similar security with much smaller key sizes, leading to faster calculations and less overhead, making them ideal for constrained environments. Regardless of the scheme, the security of any cryptographic system is only as strong as its key generation process, as shown by historical examples where basic programming errors led to easily predictable keys and complete system compromise.

The difficulty of implementing security extends to the organizational and engineering level, often dwarfing the purely technical challenges. The historical transition from the Data Encryption Standard (DES) to Triple DES (3DES) illustrates this: even though the underlying DES algorithm was not mathematically broken, the short 56-bit key was made vulnerable by increasing computer power. The resulting upgrade to 3DES—running DES three times with two or three distinct keys—was a complex, multi-year, multi-billion dollar logistical effort, highlighting the massive inertia in large systems. This inertia is why achieving crypto-agility—the ability to swap out old algorithms or keys—is so difficult and why migration efforts are often delayed or compromised.

Migrating or securing legacy systems is further complicated by implementation flaws and the difficulty of secure key destruction. Even after an application overwrites a key, the operating system's memory management may have already made hidden copies in swap files or disk caches, requiring specialized erasure tools for true security. In the context of large-scale infrastructure like the smart grid, organizations face a perpetual vendor risk, as security cannot be easily retrofitted, meaning the entire system's agility depends on the security and patching cadence of every third-party component. This requires organizational leaders to adopt rigorous processes, such as using checklists to enforce critical steps and objective risk management that quantifies the probability and potential cost of systemic failures.

  continue reading

21 epizódok

Artwork
iconMegosztás
 
Manage episode 513308563 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encryption and Diffie-Hellman (DH) being key for establishing shared secret keys. Modern ciphers like Elliptic Curve Cryptography (ECC), however, offer similar security with much smaller key sizes, leading to faster calculations and less overhead, making them ideal for constrained environments. Regardless of the scheme, the security of any cryptographic system is only as strong as its key generation process, as shown by historical examples where basic programming errors led to easily predictable keys and complete system compromise.

The difficulty of implementing security extends to the organizational and engineering level, often dwarfing the purely technical challenges. The historical transition from the Data Encryption Standard (DES) to Triple DES (3DES) illustrates this: even though the underlying DES algorithm was not mathematically broken, the short 56-bit key was made vulnerable by increasing computer power. The resulting upgrade to 3DES—running DES three times with two or three distinct keys—was a complex, multi-year, multi-billion dollar logistical effort, highlighting the massive inertia in large systems. This inertia is why achieving crypto-agility—the ability to swap out old algorithms or keys—is so difficult and why migration efforts are often delayed or compromised.

Migrating or securing legacy systems is further complicated by implementation flaws and the difficulty of secure key destruction. Even after an application overwrites a key, the operating system's memory management may have already made hidden copies in swap files or disk caches, requiring specialized erasure tools for true security. In the context of large-scale infrastructure like the smart grid, organizations face a perpetual vendor risk, as security cannot be easily retrofitted, meaning the entire system's agility depends on the security and patching cadence of every third-party component. This requires organizational leaders to adopt rigorous processes, such as using checklists to enforce critical steps and objective risk management that quantifies the probability and potential cost of systemic failures.

  continue reading

21 epizódok

Alla avsnitt

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás