Blogs

Search

Latest Blogs

SDW 2016 | Living with untrusted software | Dr David Everett

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

Modern Identity and Authentication protocols make implicit assumptions on the underlying software platforms.

Even worse you cannot in practice trust the hardware of a computing device, smart cards included.

It goes without saying that the software has to trust the correctness of the hardware on which it runs. This paper will examine the security model for an authentication protocol using an eID card and the security requirements for the core components. Then the 64 thousand dollar question, what is the probability the requirements can be met?

Founded in 1983

Microexpert has been at the forefront of cryptographic design and development since 1983, having grown organically over the last 30+ years we have consistently supported the industry in delivering the highest quality, and through continuous training and development shaped our team to deliver the best service to our clients.

©2019 Microexpert. Registered number 01755695.

Search