We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Securing Automated Decryption

Formal Metadata

Title
Securing Automated Decryption
Subtitle
New Cryptography and Techniques
Title of Series
Number of Parts
611
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production Year2017

Content Metadata

Subject Area
Genre
Abstract
This talk covers an alternative to key escrows using new cryptographictechniques implemented by the Clevis (client) and Tang (server) projects. Keeping secrets is tough. It is hard enough when you have control over thefull computing chain. But now we are expected to keep secrets while storingthose secrets in cloud and SaaS infrastructures. At least we can trust thenetwork providers, right? Of course, the answer is to encrypt the data. Butthen how do we know who should have access to the data and when? This talkwill look at the new strategies and cryptographic techniques implemented bythe Tang and Clevis open source projects. Tang forgoes complex (andcompromise-prone) key management infrastructures by using simple algorithms tobind data to third party entities. Clevis permits sophisticated unlockingpolicies that go beyond simply password management to true attributedcryptography. Come see how to integrate Tang and Clevis into yourinfrastructure or software project!