Paul C. Williams

Interfacing Technology & Business
View Paul Williams's profile on LinkedIn

Friday, November 22, 2013

Perfect Forward Security : Making bad guys work harder for your data

Every Solution Architect needs to be familiar with the state of data security technology. There is so much innovation in this space, it's hard to keep up.  The advent of elliptic curve encryption has reduce the computing cost of generating high quality keys.  Now the application of "perfect forward security" takes that to the next level, by introducing a protocol for generating session keys to prevent a single compromised key from allowing large quantities of data to be decrypted.

It's math heavy, but if you design secure systems, or are responsible for sensitive data you must know this.

SSL/TLS & Perfect Forward Secrecy

Twitter just announced that they're implementing this, and describe their lessons learned.

Both are worth the read.

No comments:

Post a Comment