Getting Away from PKI and Properly Defining a Trust Infrastructure

--

If there’s one thing that the recent Facebook hack showed, it is that a breach of a trust infrastructure can expose massive holes in any security infrastructure. It, possibly, has the greatest potential amount of damage and is often expensive to clean up. Companies thus need to think deeply about how the setup their trust infrastructure, and make sure their encryption keys are properly secured and managed, and that the access to these keys, and the rights that they bring, are also clearly defined.

One of the most expensive things for a company to resolve is a trust infrastructure breach, and where encryption keys are compromised. This might be a single key to access the SSH session for a Cloud infrastructure, or the breach of the private key which is used to secure the Web infrastructure. Unfortunately, many companies still use PKI (Public Key Infrastructure) for their infrastructure, and where the usage of digital certificates — and their static keys — can cause many problems.

So what is the solution? Well, a Key Distribution Centre (KDC) is one of the best to overcome the nightmare of dealing with digital certificates, especially in a world of IoT (and where you might have billions of devices). Within this, we define a highly secure trust infrastructure, and which will protect the encryption keys that we…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.