Practical Internet of Things Security by 2016
Author:2016
Language: eng
Format: epub, mobi
Publisher: Packt Publishing
Using validated cryptographic implementations is an excellent practice overall, but do it smartly and don't assume that certain cryptographic modules that would seem to meet all of the functional and performance requirements are a good idea for all environments.
Cryptographic key management fundamentals
Now that we have addressed basic cryptography and cryptographic modules, it is necessary to delve into the topic of cryptographic key management. Cryptographic modules can be considered cryptographically secured islands in larger systems, each module containing cryptographic algorithms, keys, and other assets needed to protect sensitive data. Deploying cryptographic modules securely, however, frequently requires cryptographic key management. Planning key management for an embedded device and/or full scale IoT enterprise is essential to securing and rolling out IoT systems. This requires organizations to normalize the types of cryptographic material within their IoT devices and ensure they work across systems and organizations. Key management is the art and science of protecting cryptographic keys within devices (crypto modules) and across the enterprise. It is an arcane technical discipline that was initially developed and evolved by the US Department of Defense long before most commercial companies had an inkling of what it was or had any need for cryptography in the first place. Now, more than ever, it is a subject that organizations must get right in order to secure connected things in our world.
The fallout from the Walker spy ring led to the creation of many of the key management systems and techniques widely used today by the Department of Defense and NSA today. Starting in 1968, US Navy officer John Walker began selling classified cryptographic key material to the Soviet intelligence services. Because this internal compromise was not discovered for many years (he was not caught until 1985), the total damage to US national security was enormous. To prevent crypto key material compromise and maintain a highly accountable system of tracking keys, various DoD services (the Navy and the Air Force) began creating their own key management systems that were eventually folded into what is today known as the NSA's Electronic Key Management System (EKMS). The EKMS is now being modernized into the key management infrastructure (KMI) (https://en.wikipedia.org/wiki/John_Anthony_Walker).
The topic of cryptographic key management is frequently misunderstood, often more so than cryptography itself. Indeed, there are few practitioners in the discipline. Cryptography and key management are siblings; the security provided by each depends enormously on the other. Key management is often not implemented at all or is implemented insecurely. Either way, unauthorized disclosure and compromise of cryptographic keys through poor key management renders the use of cryptography moot. Necessary privacy and assurance of information integrity and origin is lost.
It is also important to note that the standards that specify and describe PKIs are based on secure key management principles. PKIs, by definition, are key management systems. Regarding the IoT, it is important for organizations to understand the basic principles of key management because not all IoT devices will interact with and consume PKI certificates (that is, be able to benefit from third party key management services).
Download
Practical Internet of Things Security by 2016.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(6541)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6424)
Kotlin in Action by Dmitry Jemerov(5074)
Odoo 15 Development Essentials - Fifth Edition by Daniel Reis & Greg Mader(3393)
Odoo 15 Development Essentials by Daniel Reis(2820)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2540)
Learning Angular - Second Edition by Christoffer Noring(2364)
Pride and Prejudice by Jane Austen(2354)
Mobile Forensics Cookbook by Igor Mikhaylov(2025)
Computers For Seniors For Dummies by Nancy C. Muir(2009)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1877)
Android Development with Kotlin by Marcin Moskala & Igor Wojda(1806)
Building Android UIs with Custom Views by Raimon Ràfols Montané(1797)
1936941139 (N) by Bob Rosenthal(1740)
Building Progressive Web Apps: Bringing the Power of Native to the Browser by Ater Tal(1734)
Hands-On Internet of Things with MQTT by Tim Pulver(1717)
Android App Development by Franceschi Hervé J.;(1716)
Ember.js in Action by Joachim Haagen Skeie(1694)
Hands-On Design Patterns with React Native by Mateusz Grzesiukiewicz(1660)
