Artwork

A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Episode 4 - PKI, Quantum Threats, and the Configuration Crisis

29:23
 
Megosztás
 

Manage episode 513142076 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster symmetric ciphers like AES in a hybrid approach—the slow asymmetric math encrypts a tiny session key, and the fast symmetric cipher encrypts the large data payload. This architecture is foundational to protocols like TLS (Transport Layer Security), which uses the server's public key certificate for authentication and a Diffie-Hellman key exchange to establish a new, ephemeral symmetric session key for every single connection, a practice known as forward secrecy.

The discussion shifts to the practical engineering needed for speed, such as using specific mathematical structures like Galois Fields (GF(2)) that are efficient in computer hardware for high-speed processes like the TLS handshake. The core of modern security, from key generation to symmetric encryption, depends absolutely on true randomness (entropy), which is harvested from physical processes like electrical noise or mouse movements to "seed" the cryptographic random number generators. This inherent fragility of keys and the complexity of these systems lead to the "configuration crisis," where studies suggest a staggering 97% of real-world data breaches are caused not by breaking the advanced math, but by basic configuration errors, weak passwords, and poor cyber hygiene.

Finally, the conversation addresses the looming quantum threat posed by a future, fault-tolerant quantum computer, which could use Shor's algorithm to break the security of all current public key systems like RSA and ECC. This threat drives the urgent need for a post-quantum cryptography (PQC) migration to new algorithms, like those based on lattice cryptography, to prevent a "capture now, decrypt later" scenario where adversaries store today's encrypted data for future decryption. The episode concludes by asking if the industry is too focused on the fascinating, long-term physics puzzle of quantum computing while neglecting the more mundane, but urgent, task of fixing the basic security configuration and operational failures that cause the vast majority of current security incidents.

  continue reading

21 epizódok

Artwork
iconMegosztás
 
Manage episode 513142076 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster symmetric ciphers like AES in a hybrid approach—the slow asymmetric math encrypts a tiny session key, and the fast symmetric cipher encrypts the large data payload. This architecture is foundational to protocols like TLS (Transport Layer Security), which uses the server's public key certificate for authentication and a Diffie-Hellman key exchange to establish a new, ephemeral symmetric session key for every single connection, a practice known as forward secrecy.

The discussion shifts to the practical engineering needed for speed, such as using specific mathematical structures like Galois Fields (GF(2)) that are efficient in computer hardware for high-speed processes like the TLS handshake. The core of modern security, from key generation to symmetric encryption, depends absolutely on true randomness (entropy), which is harvested from physical processes like electrical noise or mouse movements to "seed" the cryptographic random number generators. This inherent fragility of keys and the complexity of these systems lead to the "configuration crisis," where studies suggest a staggering 97% of real-world data breaches are caused not by breaking the advanced math, but by basic configuration errors, weak passwords, and poor cyber hygiene.

Finally, the conversation addresses the looming quantum threat posed by a future, fault-tolerant quantum computer, which could use Shor's algorithm to break the security of all current public key systems like RSA and ECC. This threat drives the urgent need for a post-quantum cryptography (PQC) migration to new algorithms, like those based on lattice cryptography, to prevent a "capture now, decrypt later" scenario where adversaries store today's encrypted data for future decryption. The episode concludes by asking if the industry is too focused on the fascinating, long-term physics puzzle of quantum computing while neglecting the more mundane, but urgent, task of fixing the basic security configuration and operational failures that cause the vast majority of current security incidents.

  continue reading

21 epizódok

Wszystkie odcinki

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás