Explore Menu
Cryptographic Key Management APIs - Graham Steel

Cryptographic Key Management APIs - Graham Steel

Follow 5 / 5

OVERVIEW

  • Published By: secappdev org
  • Views: 1,663
  • Likes: 8
  • Dislikes: 0

ACHIEVEMENTS

  • A

    VIDEO
    GRADE

  • USER
    SATISFACTION

  • SIX YEARS
    ONLINE

REVENUE

  • $2

    EST. TOTAL REVENUE

  • $0 - $0

    EST. MONTHLY REVENUE

  • $0 - $1

    EST. YEARLY REVENUE

GROWTH

Exclusive Access

Start following this video and watch its growth, daily.

Follow

VIDEO

Cryptographic Key Management APIs - Graham Steel

Most developers use cryptography via an application program interface (API) either to a software library or a hardware device where keys are stored and all cryptographic operations take place. Designing such interfaces so that they offer flexible functionality but cannot be abused to reveal keys or secrets has proved to be extremely difficult, with a number of published vulnerabilities in widely-used crypto APIs appearing over the last decade.
This lecture will focus on the example of RSA PKCS#11, the most widely used interface for cryptographic devices, but will allow us to develop principles and concepts that apply to most crypto APIs. We will demonstrate a tool, Tookan, which can reverse engineer the particular configuration of PKCS#11 in use on some device under test, construct a m...

COMMENTS

Be the first to comment on this video!

You need to sign in to comment on this video.

Sign in here

SOCIAL ACTIVITY

  • 5 SHARES

  • 0 TWEETS

  • 0 +1's

  • 0 PINS

  • 0 SHARES

WEB AND NEWS

  • 2014.hackitoergosum.org    Hardware Security Modules: Attacks and Secure Configuration

    Graham Steel April 2014 Hardware Security ... I The API of the hardware is a security critical ... An Automatic Search for Security Flaws in Key Management ...

    http://2014.hackitoergosum.org/slides/day2_Hardware_Security_Modules:attacks_and_secure_configuration_Graham_Steel_hes2014.pdf

  • www.cupfighter.net    Cupfighter.net – a blog by Schuberg Philis colleagues

    By Graham Steel The year 2013 is the ... even Snowden stated that properly implemented strong cryptographic systems will actually safe ... secure key management;

    http://www.cupfighter.net/index.php/2014/03/qcon-crypto/

  • www.dagstuhl.de    Analysis of Security APIs - Dagstuhl

    Graham Steel (ENS – Cachan, FR) 1 ... is an Application Program Interface that allows untrusted ... relatively well explored domains of cryptographic key management ...

    http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=12482

  • web.cs.wpi.edu    School of Informatics, University of Edinburgh

    ... Gavin Keighren and Graham Steel ... such as key-management APIs. ... extending our results to public key cryptography remains as future work ...

    http://web.cs.wpi.edu/~guttman/cs559_website/CortierKeighrenSteel-TACAS07.pdf

  • ieeexplore.ieee.org    IEEE Xplore Abstract - Security for Key Management Interfaces

    Security for Key Management Interfaces ... Steel , G. ... definition of security for cryptographic key management APIs.

    http://ieeexplore.ieee.org/iel5/5991608/5992135/05992137.pdf?arnumber=5992137

  • perso.univ-rennes1.fr    A Secure Key Management Interface with Asymmetric Cryptography

    A Secure Key Management Interface with Asymmetric Cryptography ... symmetric key cryptography, ... A generic security API for symmetric key management

    http://perso.univ-rennes1.fr/david.lubicz/articles/post.pdf

  • www.cancione.net    Escuchar Introduction to Key Management - Descargar MP3 …

    Cryptographic Key Management APIs - Graham Steel. What is Encryption Key Management? ... Cryptography and Key Management with SafeNet's Russ Dietz. Public Key ...

    http://www.cancione.net/introduction-to-key-management;OGxwV1ZPTllGQmc=

  • dream.inf.ed.ac.uk    Final Report of Grant GR/S98139/01: Automated Analysis of ...

    Final Report of Grant GR/S98139/01: Automated Analysis of Security Critical Systems Graham Steel Alan Bundy Jacques Fleuriot October 5, 2007 1 Background/Context

    http://dream.inf.ed.ac.uk/projects/aascs/final-report.pdf

  • cryptosense.com    Author: Graham Steel | Cryptosense

    Two new attributes in PKCS#11 give you more fine-tuned control over key-management by ... sensitive cryptographic key ... used API in cryptographic ...

    https://cryptosense.com/author/graham/

  • www.inf.ed.ac.uk    Report EDI-INF-RR-1004

    ... A Formal Theory of Key ... which includes the key management API of IBM's Common Cryptographic ... and Stephanie Delaune and Graham Steel },

    http://www.inf.ed.ac.uk/publications/report/1004.html

  • www.youtube.com    Cryptographic Key Management APIs - Graham Steel - YouTube

    Video embedded · Most developers use cryptography via an application program interface (API) either to a software library or a hardware device where keys are …

    http://www.youtube.com/watch?v=BX4aTOyV1Ts

  • secappdev.org    Cryptographic Key Management APIs - SecAppDev

    Cryptographic Key Management “Key management is the hardest part of cryptography and often the Achilles’ heel of an otherwise secure system.”

    http://secappdev.org/handouts/2013/Graham%20Steel/STEEL-crytpo-apis-handouts.pdf

  • www.iti.illinois.edu    Cryptographic Key Management APIs

    Cryptographic Key Management APIs Graham Steel. In this Lecture ... Each device has a security API Graham Steel - Cryptographic Security APIs22 July 2013 - 5/ 60.

    http://www.iti.illinois.edu/sites/default/files/Steel_FMSS-crypto.pdf

  • www.iti.illinois.edu    Cryptographic Key Management APIs | Information Trust ...

    Cryptographic Key Management APIs Speaker: ... We will examine both logical flaws in key management and cryptographic flaws ... Graham Steel Graham Steel holds a ...

    http://www.iti.illinois.edu/education/formal-methods-science-security-summer-school/cryptographic-key-management-apis

  • www.securitytube.net    Cryptographic Key Management Apis - Securitytube

    Cryptographic Key Management Apis; ... Learning objectives basic design of cryptographic APIs logical flaws in key management cryptographic flaws ... by Graham Steel…

    http://www.securitytube.net/video/13761

  • www.youtube.com    Introduction to Security APIs - Graham Steel - YouTube

    Video embedded · Introduction to Security APIs, by Graham Steel A security API is an Application Program Interface that allows untrusted code to access sensitive …

    http://www.youtube.com/watch?v=z2pEcH30Y_Y

  • www.aszone.com.br    Cryptographic Key Management APIs | As Zone

    Most developers use cryptography via an application program interface ... logical flaws in key management cryptographic flaws in ... by Graham Steel.

    http://www.aszone.com.br/2015/08/cryptographic-key-management-apis/

  • link.springer.com    A Generic Security API for Symmetric Key Management on ...

    A Generic Security API for Symmetric Key Management on Cryptographic Devices V´eronique Cortier1 and Graham Steel2 1 LORIA, ... capable of symmetric key cryptography.

    http://link.springer.com/content/pdf/10.1007%2F978-3-642-04444-1_37.pdf

  • www.lsv.ens-cachan.fr    A Generic Security API for Symmetric Key Management on ...

    A Generic Security API for Symmetric Key Management on Cryptographic Devices V´eronique Cortier1 and Graham Steel2 1 ... Steel. Analysing PKCS#11 key management APIs ...

    http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-esorics09.pdf

  • Show More