Industry Expert Blogs
Provisioning Devices Securely-August 31, 2016 |
Asaf Ashkenazi of Cryptography Research (now part of Rambus) talked about provisioning devices securely at the recent Linley Mobile & Wearables Conference. The heart of all security and cryptography are keys. Security by obscurity is no security. Keys are used to authenticate the device (is it the device that is meant to be connecting?), to authenticate the server (am I connected to the right cloud?), and to protect data on the device from unauthorized access and unauthorized alteration. So the device needs to get the correct keys into it.